Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 21:53
Behavioral task
behavioral1
Sample
R B X E 5 5/Client.exe
Resource
win10v2004-20241007-en
General
-
Target
R B X E 5 5/Xeno Executor.exe
-
Size
297KB
-
MD5
221f2eb5bd8fca181e20949155b248f9
-
SHA1
8c92408ccbd98d3b052a11104f887d7667f27c02
-
SHA256
10ae35a1c778cd0aecf248d15eef65fbc4888e6c6c34a15752341c35c0406f26
-
SHA512
5aa4f77396c4563423a875d16ccaccbf4687d3ad58df5d348ead2fac84c20d101add2134f0a5f6527facacca3fa5c033f7c58a057d93879c422bd831a95b8fcb
-
SSDEEP
6144:pmt1sl0HI96EKlgJUTO12PLZ0y7FpC4FWoR0CSFl/klp2zf:UWlTKlCUTO12jZ37TC4FWtxklp2zf
Malware Config
Extracted
lumma
https://goalyfeastz.site/api
https://contemteny.site/api
https://dilemmadu.site/api
https://authorisev.site/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 2276 Xeno Executor.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2276 set thread context of 3088 2276 Xeno Executor.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 4416 3088 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87 PID 2276 wrote to memory of 3088 2276 Xeno Executor.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\R B X E 5 5\Xeno Executor.exe"C:\Users\Admin\AppData\Local\Temp\R B X E 5 5\Xeno Executor.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 12443⤵
- Program crash
PID:4416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3088 -ip 30881⤵PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD58334ea0eaa1ce1fba430e2adedf4860e
SHA1fe43d488889898ca90764396f6b95599ec9fe1fd
SHA25613c66a8fec4f46d0a5b12ed9ba948ecbfc581f7c63eff857c9f0f30ce3757e75
SHA512585b31a7ee7921a15c04ffe44665474dc691ebd75af35e0fea0a2ca6a997c929a7af44816b48dd208e6c39d1981d41fce0210860952b1367f79718500571ca12