Analysis
-
max time kernel
104s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 19:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d91a80a2583d968b1a47c3c0a903b8e0N.dll
Resource
win7-20240903-en
2 signatures
120 seconds
General
-
Target
d91a80a2583d968b1a47c3c0a903b8e0N.dll
-
Size
581KB
-
MD5
d91a80a2583d968b1a47c3c0a903b8e0
-
SHA1
f0d7b332e9bfc601e702025ac1be0a78c86f86fc
-
SHA256
c5151ecfe315254b3651d045a02be27de023c70d8d4ee5ace6c92eff57fa3ef5
-
SHA512
8becb383dd67602466002f6debd19b02ef8099d0e4a38fd785cd41bc2fd67f7bc79a1a019f74d72b2631cf56a59f6ed0a15a0808deb9be54baeeb8b4df5e8c1b
-
SSDEEP
12288:pSxO3+BKwSQ5FlF9KOTUl1CXz/srGI+LDHb+JT2dr:pSg3+BKwSQ5F/wfAMGIbad
Malware Config
Extracted
Family
lumma
C2
https://muggudrowiwm.shop/api
https://condedqpwqm.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2464 set thread context of 2272 2464 rundll32.exe 85 -
Program crash 3 IoCs
pid pid_target Process procid_target 732 2272 WerFault.exe 85 828 2272 WerFault.exe 85 924 2272 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2464 2356 rundll32.exe 83 PID 2356 wrote to memory of 2464 2356 rundll32.exe 83 PID 2356 wrote to memory of 2464 2356 rundll32.exe 83 PID 2464 wrote to memory of 2272 2464 rundll32.exe 85 PID 2464 wrote to memory of 2272 2464 rundll32.exe 85 PID 2464 wrote to memory of 2272 2464 rundll32.exe 85 PID 2464 wrote to memory of 2272 2464 rundll32.exe 85 PID 2464 wrote to memory of 2272 2464 rundll32.exe 85 PID 2464 wrote to memory of 2272 2464 rundll32.exe 85 PID 2464 wrote to memory of 2272 2464 rundll32.exe 85 PID 2464 wrote to memory of 2272 2464 rundll32.exe 85 PID 2464 wrote to memory of 2272 2464 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d91a80a2583d968b1a47c3c0a903b8e0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d91a80a2583d968b1a47c3c0a903b8e0N.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 11684⤵
- Program crash
PID:732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 11564⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 11564⤵
- Program crash
PID:924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2272 -ip 22721⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2272 -ip 22721⤵PID:2788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2272 -ip 22721⤵PID:1704