Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 10:12
Static task
static1
Behavioral task
behavioral1
Sample
EULAzoGC4F1Djp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EULAzoGC4F1Djp.exe
Resource
win10v2004-20240802-en
General
-
Target
EULAzoGC4F1Djp.exe
-
Size
2.2MB
-
MD5
c839480656bd34e7e9bc4df19adbb6e5
-
SHA1
e035300a359576f0478cb8c98edfe746201eef8a
-
SHA256
6f9709971e88d1a0a0ab7099c7e050f3347787c267a1f9cf422d3b5bab44ead5
-
SHA512
d9f3fa991d5a9432c1e4455abf04ec14651f15d191fddf777c68bd1ebdee08fedc0fbf659aef2d4d255af0ba7d584dc39a0f1b3b6e874fa4bb6af55fffb86741
-
SSDEEP
12288:ivdcCt2VQjYLDkqEv9BIWl00Ftg46VWECEsEu+u9K1:kcCMXaBB/MTCEdu+n1
Malware Config
Extracted
lumma
195.123.227.138
Signatures
-
Detect Lumma Stealer payload V2 1 IoCs
resource yara_rule behavioral2/memory/2384-1-0x00000000005B0000-0x0000000000627000-memory.dmp family_lumma_V2 -
Detect Lumma Stealer payload V4 1 IoCs
resource yara_rule behavioral2/memory/2384-1-0x00000000005B0000-0x0000000000627000-memory.dmp family_lumma_v4 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2384 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3036 set thread context of 2384 3036 EULAzoGC4F1Djp.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 4452 3036 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EULAzoGC4F1Djp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2384 RegSvcs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2384 3036 EULAzoGC4F1Djp.exe 87 PID 3036 wrote to memory of 2384 3036 EULAzoGC4F1Djp.exe 87 PID 3036 wrote to memory of 2384 3036 EULAzoGC4F1Djp.exe 87 PID 3036 wrote to memory of 2384 3036 EULAzoGC4F1Djp.exe 87 PID 3036 wrote to memory of 2384 3036 EULAzoGC4F1Djp.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\EULAzoGC4F1Djp.exe"C:\Users\Admin\AppData\Local\Temp\EULAzoGC4F1Djp.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 1402⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3036 -ip 30361⤵PID:4792