Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 04:12
Static task
static1
Behavioral task
behavioral1
Sample
1517405c50741a33696df86601857267.exe
Resource
win7-20240903-en
General
-
Target
1517405c50741a33696df86601857267.exe
-
Size
273KB
-
MD5
1517405c50741a33696df86601857267
-
SHA1
0dfea5db40203c5b1b9996b1c7308f11ef373e2e
-
SHA256
a158edfc4c30ef65360883c6017df01d656a482e48482d709f0d03560449f2c0
-
SHA512
51314640b7753d3329da53f4ce53545c81baaf90170db9fd0b217844d1eb02eaaafb7d3ad370bafda1c7c088929dc4c09a9a0979b744ab1138c8f2fd5a4e9e88
-
SSDEEP
6144:nIlVzRVQ+sCKpXn/bGoUiaergD5CPaIUMnFvtPyYG64HrM:eVzUb1n/vaMWnMFUpL
Malware Config
Extracted
lumma
https://weaknessmznxo.shop/api
https://interactiedovspm.shop/api
https://charecteristicdxp.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 2668 1992 1517405c50741a33696df86601857267.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1517405c50741a33696df86601857267.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30 PID 1992 wrote to memory of 2668 1992 1517405c50741a33696df86601857267.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1517405c50741a33696df86601857267.exe"C:\Users\Admin\AppData\Local\Temp\1517405c50741a33696df86601857267.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2668
-