Analysis
-
max time kernel
438s -
max time network
433s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 08:10
Static task
static1
General
-
Target
CBBE_Skyrim_V1.0.7z
-
Size
87.2MB
-
MD5
f1ac906874e39cfc90adb906f7eda5b9
-
SHA1
1b56ff878192c4a2929d6df3c33fec7afdb94565
-
SHA256
686142cd5dcb64078dcc014bf37cc639dd9b312c02a9aa55598b95638bf13bf0
-
SHA512
f66671a31648be68d6f9820e0bb8b1aa9f66c1e440424c46efc38048bbfc2a298bbc7e23d79334af43f7d010669503bc6896f062e7709d96a0311229e4f552e5
-
SSDEEP
1572864:wzDy9Z6G9mO5ZYuK736weVM+qN6I9WSRKhCBwfkYKtgqvENCAJ9pEdcQaETjo6A6:wz+1quAGM+qN6IQSwhkwfkYKXscuEdBn
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Lumma family
-
Executes dropped EXE 3 IoCs
Processes:
Unpacker.exeUnpacker.exeUnpacker.exepid process 2084 Unpacker.exe 1040 Unpacker.exe 5232 Unpacker.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Unpacker.exedescription pid process target process PID 2084 set thread context of 5232 2084 Unpacker.exe Unpacker.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5380 2084 WerFault.exe Unpacker.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Unpacker.exeUnpacker.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unpacker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unpacker.exe -
Modifies registry class 2 IoCs
Processes:
7zFM.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 2424 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2424 7zFM.exe Token: 35 2424 7zFM.exe Token: SeSecurityPrivilege 2424 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid process 2424 7zFM.exe 2424 7zFM.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Unpacker.exedescription pid process target process PID 2084 wrote to memory of 1040 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 1040 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 1040 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe PID 2084 wrote to memory of 5232 2084 Unpacker.exe Unpacker.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\CBBE_Skyrim_V1.0.7z"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2424
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5316
-
C:\Users\Admin\Desktop\New folder\Unpacker.exe"C:\Users\Admin\Desktop\New folder\Unpacker.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\Desktop\New folder\Unpacker.exe"C:\Users\Admin\Desktop\New folder\Unpacker.exe"2⤵
- Executes dropped EXE
PID:1040
-
-
C:\Users\Admin\Desktop\New folder\Unpacker.exe"C:\Users\Admin\Desktop\New folder\Unpacker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 2642⤵
- Program crash
PID:5380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2084 -ip 20841⤵PID:5332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
752KB
MD57d39eabebcc2041aa608ca797a6dbbd4
SHA11ebf11ee8788aa05068e2fffbe0efd89d39ee23d
SHA256bd2ba38b08859e3cd096a8c243c78cd3463ee5ff6a391e8a2ae410a96375a631
SHA5125c2813b3a11719b8f0c6f27d7c22d1b2aed4afddb2e7d4d287beb3e4f3a277bfe0aaa4d0efb54d674fb69beeef788af14aa96c8a1bdcdd24c0962dd3100360ec
-
Filesize
1KB
MD5ed988fd9b650213e087ed231fd43d86a
SHA12fbebbde2e26ea36a2a8b75e6fc188fa8d048433
SHA256faf3a6e695e96b2091e567de264b60de8302f64ca8a6c558002955bc67eddf7e
SHA5121c0a02c7bd583945f205540423240b85e200b83abaf5f682ecee4de07605e25ff1c65a37aa521ee0b5b7992b08401ecba3d87a3b81a9774b6cf31899ba9530b0
-
Filesize
1KB
MD59d5899684c4507b9416cc63061821604
SHA1f3c98954e64d3d150480c2d6c03296b99a122552
SHA2564b40aaeb98d83b2a50b2f6b0e9a0e6f784709372e84ca83cb83dad5315e09569
SHA51221d7242f05503cdbd2c8926f163b4c1ce327a3730c40e8399290389fd998bad3b9dd06702426d8b541fa84b6cacf50a495a5a1f712f7ca3209744d9eb5fbc815