Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
28d222fd592e63b9e73a63f8a2806532.exe
Resource
win7-20240903-en
8 signatures
150 seconds
General
-
Target
28d222fd592e63b9e73a63f8a2806532.exe
-
Size
1.7MB
-
MD5
28d222fd592e63b9e73a63f8a2806532
-
SHA1
f579377b26b455fb1331623a2e7d0fedc71e255c
-
SHA256
ca21c5b129c001c2b51359d5f74c0a99667028810623b779190b13f0de86369e
-
SHA512
79d468087f729934de907e7c764610ee1a025ab020d6bcf2db9471b366e10c2ed503dddc72983db6f4be15ed44161a21f3ed9482aae02ed1687e5344250f4647
-
SSDEEP
24576:PCdbNNTSt/qWkAOh6wc0xqkTDxk43LfzAAdZeAr+Jor0I5ciRl8Jb73sIy:PwNUkAc6wLTjAkPrOq5c4a73sIy
Malware Config
Extracted
Family
lumma
C2
gstatic-node.io
blockigro.xyz
Signatures
-
Detect Lumma Stealer payload V2 4 IoCs
resource yara_rule behavioral2/memory/1292-32-0x0000000000400000-0x0000000000465000-memory.dmp family_lumma_V2 behavioral2/memory/1292-35-0x0000000000400000-0x0000000000465000-memory.dmp family_lumma_V2 behavioral2/memory/1292-38-0x0000000000400000-0x0000000000465000-memory.dmp family_lumma_V2 behavioral2/memory/1292-36-0x0000000000400000-0x0000000000465000-memory.dmp family_lumma_V2 -
Detect Lumma Stealer payload V4 4 IoCs
resource yara_rule behavioral2/memory/1292-32-0x0000000000400000-0x0000000000465000-memory.dmp family_lumma_v4 behavioral2/memory/1292-35-0x0000000000400000-0x0000000000465000-memory.dmp family_lumma_v4 behavioral2/memory/1292-38-0x0000000000400000-0x0000000000465000-memory.dmp family_lumma_v4 behavioral2/memory/1292-36-0x0000000000400000-0x0000000000465000-memory.dmp family_lumma_v4 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28d222fd592e63b9e73a63f8a2806532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1624 28d222fd592e63b9e73a63f8a2806532.exe 1624 28d222fd592e63b9e73a63f8a2806532.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1624 28d222fd592e63b9e73a63f8a2806532.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1624 wrote to memory of 4112 1624 28d222fd592e63b9e73a63f8a2806532.exe 100 PID 1624 wrote to memory of 4112 1624 28d222fd592e63b9e73a63f8a2806532.exe 100 PID 1624 wrote to memory of 4112 1624 28d222fd592e63b9e73a63f8a2806532.exe 100 PID 1624 wrote to memory of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101 PID 1624 wrote to memory of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101 PID 1624 wrote to memory of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101 PID 1624 wrote to memory of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101 PID 1624 wrote to memory of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101 PID 1624 wrote to memory of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101 PID 1624 wrote to memory of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101 PID 1624 wrote to memory of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101 PID 1624 wrote to memory of 1292 1624 28d222fd592e63b9e73a63f8a2806532.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\28d222fd592e63b9e73a63f8a2806532.exe"C:\Users\Admin\AppData\Local\Temp\28d222fd592e63b9e73a63f8a2806532.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4200,i,13995403245988825027,7033610968827661507,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:81⤵PID:752