Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe
Resource
win7-20241010-en
General
-
Target
56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe
-
Size
1.0MB
-
MD5
fca874fcb9f344ec26f3ae4d359e75d7
-
SHA1
f21315cd57ec269b43d6afba58febe39793b72f2
-
SHA256
56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce
-
SHA512
26b15070ebd0cce7a9c4b2f9188bf5a0fbc30724ffbb48c590e7f2379af896ef05e5a2f8f39462c50aaaa91c57f36394b54453a97b9f779aad379f5d24db8e0e
-
SSDEEP
24576:1+BNeMxzXC64aUn+EbWKpFOEMalcU3Aa2FTL3JkMt4Qe1CqxO9zTp:cLDxzXC64aUnqKpHlv3Al7JH4t1CUy
Malware Config
Extracted
lumma
https://forbidstow.site/api
https://goalyfeastz.site/api
https://contemteny.site/api
https://dilemmadu.site/api
https://authorisev.site/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exedescription pid Process procid_target PID 2380 set thread context of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exedescription pid Process procid_target PID 2380 wrote to memory of 1636 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 31 PID 2380 wrote to memory of 1636 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 31 PID 2380 wrote to memory of 1636 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 31 PID 2380 wrote to memory of 1636 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 31 PID 2380 wrote to memory of 768 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 32 PID 2380 wrote to memory of 768 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 32 PID 2380 wrote to memory of 768 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 32 PID 2380 wrote to memory of 768 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 32 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33 PID 2380 wrote to memory of 2308 2380 56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe"C:\Users\Admin\AppData\Local\Temp\56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe"C:\Users\Admin\AppData\Local\Temp\56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe"2⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe"C:\Users\Admin\AppData\Local\Temp\56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe"2⤵PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe"C:\Users\Admin\AppData\Local\Temp\56fc365c91e437d19a582a267bfee66ae4d2b4e8c9b039523119d7c9dc6c9fce.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2308
-