Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
517a260cf7c5dc7a305bc281670cec3e.exe
Resource
win7-20240903-en
General
-
Target
517a260cf7c5dc7a305bc281670cec3e.exe
-
Size
5.6MB
-
MD5
517a260cf7c5dc7a305bc281670cec3e
-
SHA1
b6cb81244740254e40a4ef289fe7d9e0fe2ab521
-
SHA256
7cc7b64b9d8ec98659bc74cf61e627c3f62631e88ad8441f86b8f299b25f4b90
-
SHA512
1bdb15639e453ceef3ae7aea4bb4b1715d8871fc415f9c2d933ce151bf9721ceb28a1f386028de7e289a14ef9d791278d355c0b3948c45b6845e22172be85d46
-
SSDEEP
49152:GE4AqQJc7bTljcyvLCpGdQ9ocyu2GfzXo3Md1eVr5EbotlAjC5Eu2ms5HRZq2TXW:CBQGh2G4yMjo3Md1eV5EY+KcP
Malware Config
Extracted
lumma
https://entertainingwzw.shop/api
https://bouncedgowp.shop/api
https://bannngwko.shop/api
https://bargainnykwo.shop/api
https://affecthorsedpo.shop/api
https://radiationnopp.shop/api
https://answerrsdo.shop/api
https://publicitttyps.shop/api
https://benchillppwo.shop/api
Extracted
lumma
https://entertainingwzw.shop/api
https://bannngwko.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3056 set thread context of 4772 3056 517a260cf7c5dc7a305bc281670cec3e.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3056 wrote to memory of 4772 3056 517a260cf7c5dc7a305bc281670cec3e.exe 96 PID 3056 wrote to memory of 4772 3056 517a260cf7c5dc7a305bc281670cec3e.exe 96 PID 3056 wrote to memory of 4772 3056 517a260cf7c5dc7a305bc281670cec3e.exe 96 PID 3056 wrote to memory of 4772 3056 517a260cf7c5dc7a305bc281670cec3e.exe 96 PID 3056 wrote to memory of 4772 3056 517a260cf7c5dc7a305bc281670cec3e.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\517a260cf7c5dc7a305bc281670cec3e.exe"C:\Users\Admin\AppData\Local\Temp\517a260cf7c5dc7a305bc281670cec3e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:4772
-