Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
517a260cf7c5dc7a305bc281670cec3e.exe
Resource
win7-20240903-en
General
-
Target
517a260cf7c5dc7a305bc281670cec3e.exe
-
Size
5.6MB
-
MD5
517a260cf7c5dc7a305bc281670cec3e
-
SHA1
b6cb81244740254e40a4ef289fe7d9e0fe2ab521
-
SHA256
7cc7b64b9d8ec98659bc74cf61e627c3f62631e88ad8441f86b8f299b25f4b90
-
SHA512
1bdb15639e453ceef3ae7aea4bb4b1715d8871fc415f9c2d933ce151bf9721ceb28a1f386028de7e289a14ef9d791278d355c0b3948c45b6845e22172be85d46
-
SSDEEP
49152:GE4AqQJc7bTljcyvLCpGdQ9ocyu2GfzXo3Md1eVr5EbotlAjC5Eu2ms5HRZq2TXW:CBQGh2G4yMjo3Md1eV5EY+KcP
Malware Config
Extracted
lumma
https://entertainingwzw.shop/api
https://bouncedgowp.shop/api
https://bannngwko.shop/api
https://bargainnykwo.shop/api
https://affecthorsedpo.shop/api
https://radiationnopp.shop/api
https://answerrsdo.shop/api
https://publicitttyps.shop/api
https://benchillppwo.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2408 set thread context of 1816 2408 517a260cf7c5dc7a305bc281670cec3e.exe 31 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1816 2408 517a260cf7c5dc7a305bc281670cec3e.exe 31 PID 2408 wrote to memory of 1816 2408 517a260cf7c5dc7a305bc281670cec3e.exe 31 PID 2408 wrote to memory of 1816 2408 517a260cf7c5dc7a305bc281670cec3e.exe 31 PID 2408 wrote to memory of 1816 2408 517a260cf7c5dc7a305bc281670cec3e.exe 31 PID 2408 wrote to memory of 1816 2408 517a260cf7c5dc7a305bc281670cec3e.exe 31 PID 2408 wrote to memory of 1816 2408 517a260cf7c5dc7a305bc281670cec3e.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\517a260cf7c5dc7a305bc281670cec3e.exe"C:\Users\Admin\AppData\Local\Temp\517a260cf7c5dc7a305bc281670cec3e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:1816
-