Analysis
-
max time kernel
123s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
FolderIco.exe
Resource
win7-20240903-en
General
-
Target
FolderIco.exe
-
Size
753.6MB
-
MD5
94f77e3a1794f9bd6b5b46d802d58c90
-
SHA1
3be27943838a5101b5480d2ff10cb2b8aa9571ab
-
SHA256
a5865894b2f5df8ce547f0d9d8474b97d6dcb2e4c35a00d5e553bea4294a1c0d
-
SHA512
551da341b9cbdf02934883b5c1bbc2136e26b4e17a7e92b7fa9ec49b188e3f5cdbe1ac441c9eda06a7ff4ec43bdc99d76f572fff86d6ce357f4f69d7bcd5dc68
-
SSDEEP
196608:5TDsz3ESY7FUD5sFqBJm5D1l2Q9zQSLmQTiHh8+aSUJZ0OQrHLRZPfMJ7ObKS:c0v76tsFdXESvp6H1tDK
Malware Config
Extracted
lumma
https://covvercilverow.shop/api
https://surroundeocw.shop/api
https://abortinoiwiam.shop/api
https://pumpkinkwquo.shop/api
https://priooozekw.shop/api
https://deallyharvenw.shop/api
https://defenddsouneuw.shop/api
https://racedsuitreow.shop/api
https://pianoswimen.shop/api
Extracted
lumma
https://abortinoiwiam.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 4032 3040 FolderIco.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FolderIco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3040 FolderIco.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4032 3040 FolderIco.exe 96 PID 3040 wrote to memory of 4032 3040 FolderIco.exe 96 PID 3040 wrote to memory of 4032 3040 FolderIco.exe 96 PID 3040 wrote to memory of 4032 3040 FolderIco.exe 96 PID 3040 wrote to memory of 4032 3040 FolderIco.exe 96 PID 3040 wrote to memory of 4032 3040 FolderIco.exe 96 PID 3040 wrote to memory of 4032 3040 FolderIco.exe 96 PID 3040 wrote to memory of 4032 3040 FolderIco.exe 96 PID 3040 wrote to memory of 4032 3040 FolderIco.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\FolderIco.exe"C:\Users\Admin\AppData\Local\Temp\FolderIco.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3036,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:81⤵PID:4204