Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 15:26
Static task
static1
1 signatures
0 signatures
150 seconds
4 signatures
150 seconds
General
-
Target
-
Size
752.8MB
-
MD5
d77e9cb60a0b25d28b9041073f9ae2b4
-
SHA1
abc1f1e9dc55bf9c4cadbb43e21f451fd10035d0
-
SHA256
bffa8d4d3509f9af8531ee64e6f889ee11700f9684feddaa5c806439c6b876db
-
SHA512
10d4fe0b15b3c790e37f85888ebbcaca77d018145f129084936b2a941a4f40b08e0fa2e35dc46edf57565b6426516a122c8d32b5febc2acd8bfdd4ce092ea695
-
SSDEEP
196608:Ps4d7ZeXQ6vWpb1tHFSIjYwJS1QmpOOUjNSoisC2MqGXakykKg:dZGysuYX/AdjNfFqnyk1
Malware Config
Extracted
Family
lumma
C2
https://complainnykso.shop/api
https://basedsymsotp.shop/api
https://charistmatwio.shop/api
https://grassemenwji.shop/api
https://stitchmiscpaew.shop/api
https://commisionipwn.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 796 set thread context of 3580 796 [email protected] 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 796 wrote to memory of 3580 796 [email protected] 91 PID 796 wrote to memory of 3580 796 [email protected] 91 PID 796 wrote to memory of 3580 796 [email protected] 91 PID 796 wrote to memory of 3580 796 [email protected] 91 PID 796 wrote to memory of 3580 796 [email protected] 91 PID 796 wrote to memory of 3580 796 [email protected] 91 PID 796 wrote to memory of 3580 796 [email protected] 91 PID 796 wrote to memory of 3580 796 [email protected] 91 PID 796 wrote to memory of 3580 796 [email protected] 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3580
-