Analysis
-
max time kernel
311s -
max time network
316s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
common sense soham swami book.exe
Resource
win7-20240903-en
General
-
Target
common sense soham swami book.exe
-
Size
933.1MB
-
MD5
258e819f112fcec3a0a32483ad282344
-
SHA1
81328127afb5a94edf7e750498aac498ba67fc8e
-
SHA256
7def2c0c9f6f4553ed7360fcda84369d6c2d524b1763688ec1ca2fbdfdbb7199
-
SHA512
dc2df627cdcc6fa7244329910ecdc6195f3e0fc47a5f05afcb28bc96e6eee1eab9970427c67866b4a03be26edfa5208ceeff9d2c4c92a23d5627656ab922ca31
-
SSDEEP
1572864:DRJ4FGF8ZpORSnl2FDFKgFwhwduFRF3F93Hr6C3zFiFUFoYoiZeNLuQRZPooFq:D8x1lA
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 2540 Engineering.com -
Loads dropped DLL 1 IoCs
pid Process 2736 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 692 tasklist.exe 880 tasklist.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\PostcardReplication common sense soham swami book.exe File opened for modification C:\Windows\MunicipalIncreasing common sense soham swami book.exe File opened for modification C:\Windows\PharmaciesTiles common sense soham swami book.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language common sense soham swami book.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Engineering.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Engineering.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Engineering.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Engineering.com -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2540 Engineering.com 2540 Engineering.com 2540 Engineering.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 692 tasklist.exe Token: SeDebugPrivilege 880 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2540 Engineering.com 2540 Engineering.com 2540 Engineering.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2540 Engineering.com 2540 Engineering.com 2540 Engineering.com -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2736 1924 common sense soham swami book.exe 30 PID 1924 wrote to memory of 2736 1924 common sense soham swami book.exe 30 PID 1924 wrote to memory of 2736 1924 common sense soham swami book.exe 30 PID 1924 wrote to memory of 2736 1924 common sense soham swami book.exe 30 PID 2736 wrote to memory of 692 2736 cmd.exe 32 PID 2736 wrote to memory of 692 2736 cmd.exe 32 PID 2736 wrote to memory of 692 2736 cmd.exe 32 PID 2736 wrote to memory of 692 2736 cmd.exe 32 PID 2736 wrote to memory of 1596 2736 cmd.exe 33 PID 2736 wrote to memory of 1596 2736 cmd.exe 33 PID 2736 wrote to memory of 1596 2736 cmd.exe 33 PID 2736 wrote to memory of 1596 2736 cmd.exe 33 PID 2736 wrote to memory of 880 2736 cmd.exe 35 PID 2736 wrote to memory of 880 2736 cmd.exe 35 PID 2736 wrote to memory of 880 2736 cmd.exe 35 PID 2736 wrote to memory of 880 2736 cmd.exe 35 PID 2736 wrote to memory of 872 2736 cmd.exe 36 PID 2736 wrote to memory of 872 2736 cmd.exe 36 PID 2736 wrote to memory of 872 2736 cmd.exe 36 PID 2736 wrote to memory of 872 2736 cmd.exe 36 PID 2736 wrote to memory of 1944 2736 cmd.exe 37 PID 2736 wrote to memory of 1944 2736 cmd.exe 37 PID 2736 wrote to memory of 1944 2736 cmd.exe 37 PID 2736 wrote to memory of 1944 2736 cmd.exe 37 PID 2736 wrote to memory of 2760 2736 cmd.exe 38 PID 2736 wrote to memory of 2760 2736 cmd.exe 38 PID 2736 wrote to memory of 2760 2736 cmd.exe 38 PID 2736 wrote to memory of 2760 2736 cmd.exe 38 PID 2736 wrote to memory of 2932 2736 cmd.exe 39 PID 2736 wrote to memory of 2932 2736 cmd.exe 39 PID 2736 wrote to memory of 2932 2736 cmd.exe 39 PID 2736 wrote to memory of 2932 2736 cmd.exe 39 PID 2736 wrote to memory of 2540 2736 cmd.exe 40 PID 2736 wrote to memory of 2540 2736 cmd.exe 40 PID 2736 wrote to memory of 2540 2736 cmd.exe 40 PID 2736 wrote to memory of 2540 2736 cmd.exe 40 PID 2736 wrote to memory of 2028 2736 cmd.exe 41 PID 2736 wrote to memory of 2028 2736 cmd.exe 41 PID 2736 wrote to memory of 2028 2736 cmd.exe 41 PID 2736 wrote to memory of 2028 2736 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\common sense soham swami book.exe"C:\Users\Admin\AppData\Local\Temp\common sense soham swami book.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Cookies Cookies.cmd & Cookies.cmd2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"3⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:872
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5692133⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PoweredBackingCureFeed" Gets3⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Indicated + ..\Wife + ..\Running + ..\Armstrong + ..\Neither + ..\Pdas + ..\Architect C3⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\569213\Engineering.comEngineering.com C3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2540
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD567ee52d4799f2837ad4db59ed23c9993
SHA17aa8bc571d41b32101987bfddde4335049a718d3
SHA25615494881b57776c6dc58aafaea3d28f63d91ecbd60d25b7e21f9b9e807f099e3
SHA51244320e1559a6cfb9279a5bda859e5ad2c3a8034d659302c732db9b0b0c15196bc9baa271e42e7a8908394905dc9a4314568f990d07268a5f6c4075049a5f3b83
-
Filesize
18KB
MD5e5b2d325666fd747e7ab078c9b83fd86
SHA125d17fcc5c19dff3b8de58caf810010ba2b72c7d
SHA2562e153cbd5db46d50b15aaa63ad8452a363d4e89a770c8eb4ed5e4774f56a0444
SHA512e1b9d98f23292607970adb3adf5b3b09042ac6c88de026f0f932e9d26d068b9336f781d71198764117d6999f02e795e21834f3929349e7056afa2fb54675a749
-
Filesize
95KB
MD558fe0fce9a9f664672438c5ca06ff66a
SHA11824b620eae746455362c72fc6d80557fd164c62
SHA2561003f74c5787b669da9ec9962fb04f03f1e6ae478baf8f9cced0b1da37920470
SHA5128a499fbe45deb92e607d716b3e36ce0ebcf91a5afc4439140cb95363c6a5f581e04d8efcae946ecd90a74947a6ad200bd6f89199c8e7893f3cf9c429a341651a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
16KB
MD5ca43c213f2cf762c98d1996e9af1aca8
SHA1195bce7f0bc7f26f15d6f7558a33e411394cf8e1
SHA256ea4f12d8a844763d7f37e98f763dc3db21c577b4a825102075bb4e74953fcc8e
SHA512d2a7eaa7ffe462715d2f80c05d895299a6365922b262971e572355c62776e07faa6a719e1fa9df8209dc27e5d433b40eb0db5b82915df82345b4559f8493d88a
-
Filesize
1KB
MD54f04349c46f74da89b17d6f5f9ae09f3
SHA1ba520acd28b82de0a447140bbf4be8f69827ea46
SHA25695cb01ef4263635cbe4bd1ff40cf6a3cf401ac4a4155ecac16d8213ba13f9c21
SHA512546b1421cffe45225626a9fb44215f2749d1e98721a0c50d230254e9ecee8646ccef034152f8284744455dceeca882859e9156f586061ca73cfbfb6fd9d79a4c
-
Filesize
920KB
MD55f17782f898057fda3b89d1e656c9fe0
SHA1150a8e00e58d85d2bd9d650f5b60984649b5b2d1
SHA2563a215b7b9ed739a986c8363b2b2421a66e381ce0481de9b228e0da90faf1d0c8
SHA51273dd7fb9370eb525d2caf362d91e851c07ed21edc82820cca084a5656ac0215345c6832509afd7454b908aea86852fd4d9ad0785ad03d6fa803689dbf27dd24f
-
Filesize
65KB
MD551921fd352621bd6411f85315cdfd59b
SHA12556272245da6942413a0456768d48dc0b706d2f
SHA2565dc417980c1bb48f43c5279664a7c78976c624c57690b1f4cbfe2aca9e707259
SHA512bb91dcc523c2c783ea9c9b3df344189936539e23e4072deac2b06b7c72f58dff2f6c9cd56878ccb374f2bcc43a575829ae065bb99d82c3bd9046d2a1a49b25a9
-
Filesize
58KB
MD568f015e0d3bc804998b04ae0de3dee95
SHA1c5e0fbd2fc40e1c7da6b980cc496aff99b3cc9d6
SHA2561f7219ed8fb75ca912afc901dd9142c18cb1d760da9369857eeb02480226d512
SHA51275f563e0468d3413ce26eecda889a92db6f49870e0cefc71b4f9ad4ba21e4d00dfd00465a193eec30b04008104baf4e2a43172b8e456c32c96f408bc264c7e4b
-
Filesize
83KB
MD55ac6f1297b1e01dddcdcb9d9eb17d838
SHA19bc3bc637a844c8377fd7ea114c4b3189ea19215
SHA256434c3700fb9450c34712b68cd14c96c02f23415b61ccee04f941e9ddc150f922
SHA512040d00389a6b9480faff33408bc40204184a13b68fd1d164576146a0890e3e3061ba92b9689eed088b275344abed25da9acb94b7518e88860554fc203e955aca
-
Filesize
82KB
MD5645cc9fc530da0531d577d7fb8f06e28
SHA163c0f725245f89627ee93ee3344366d3328dad6d
SHA25685ff273ad56dba6c67b14bb9fa5dc4a7ba499a30b226e463b900841b9fd208dc
SHA5124997749308992b4f2d04f258755fa8d936146c0e593799aa0160b78fd7281573052f7316a7ec813a789fd9674f65e03cf2e02dbff4d3fc7f1c6f77b0a61e53a2
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
71KB
MD536c57e7d81aa75c4f267492f1f092eb9
SHA1ef8cc9400518ed945d6c3071f2c13887949ea2c2
SHA256005511dbf25a10306fbf48c5c55f1f8c8ac8b341a1387947a75c051616d61991
SHA512cb9b9d035a1ce5c1520cff184b235fca1fe98f68470889db1d0b6bf2fa2ac496e7874ad6121e96aa219e9508e05ea8ebc2454928f8b60767a817777864b28283
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317