Analysis
-
max time kernel
64s -
max time network
69s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
19-11-2024 19:17
Static task
static1
General
-
Target
Software V.1.3.rar
-
Size
53.0MB
-
MD5
4e6bf01d516a8438c68740a7e0a38549
-
SHA1
3cd430f29c3d72c12c51f919a652986ac60883dd
-
SHA256
f914a25c6b1447ef24396a03c454f3a8ff339e436f542269e5c5c6b7ea778f9f
-
SHA512
0b1834dd706358fdaadde72fa18061c0bd1a619718561c1f40051253bc06de0c743cd70734a55d7cf327d9ba60b466a7f348d1a645dc1aafffe421446477c557
-
SSDEEP
786432:RgFiAEN1XwTCBBGMf8Q7DK7t6PDn8ogp1AjXktzXKI7U1fEaBkwBwe:RgF0NVwTCBhf8IK7M8ogDA7ktUhEadwe
Malware Config
Extracted
lumma
https://conceptionnyi.sbs
https://platformcati.sbs
https://nervepianoyo.sbs
https://qualifielgalt.sbs
https://smashygally.sbs
https://fightyglobo.sbs
https://modellydivi.sbs
https://pioneeruyj.sbs
https://underlinefiue.sbs
Extracted
lumma
https://platformcati.sbs/api
Signatures
-
Lumma family
-
Executes dropped EXE 4 IoCs
pid Process 852 Software V.1.3.exe 3880 Software V.1.3.exe 2416 Software V.1.3.exe 4912 Software V.1.3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 852 set thread context of 3880 852 Software V.1.3.exe 92 PID 2416 set thread context of 4912 2416 Software V.1.3.exe 99 -
Program crash 5 IoCs
pid pid_target Process procid_target 3792 852 WerFault.exe 90 2820 3880 WerFault.exe 92 4124 2416 WerFault.exe 98 4368 4912 WerFault.exe 99 2008 4912 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Software V.1.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Software V.1.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Software V.1.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Software V.1.3.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3892 7zFM.exe 3892 7zFM.exe 3892 7zFM.exe 3892 7zFM.exe 3892 7zFM.exe 3892 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3892 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3892 7zFM.exe Token: 35 3892 7zFM.exe Token: SeSecurityPrivilege 3892 7zFM.exe Token: SeSecurityPrivilege 3892 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3892 7zFM.exe 3892 7zFM.exe 3892 7zFM.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3892 wrote to memory of 852 3892 7zFM.exe 90 PID 3892 wrote to memory of 852 3892 7zFM.exe 90 PID 3892 wrote to memory of 852 3892 7zFM.exe 90 PID 852 wrote to memory of 3880 852 Software V.1.3.exe 92 PID 852 wrote to memory of 3880 852 Software V.1.3.exe 92 PID 852 wrote to memory of 3880 852 Software V.1.3.exe 92 PID 852 wrote to memory of 3880 852 Software V.1.3.exe 92 PID 852 wrote to memory of 3880 852 Software V.1.3.exe 92 PID 852 wrote to memory of 3880 852 Software V.1.3.exe 92 PID 852 wrote to memory of 3880 852 Software V.1.3.exe 92 PID 852 wrote to memory of 3880 852 Software V.1.3.exe 92 PID 852 wrote to memory of 3880 852 Software V.1.3.exe 92 PID 3892 wrote to memory of 2416 3892 7zFM.exe 98 PID 3892 wrote to memory of 2416 3892 7zFM.exe 98 PID 3892 wrote to memory of 2416 3892 7zFM.exe 98 PID 2416 wrote to memory of 4912 2416 Software V.1.3.exe 99 PID 2416 wrote to memory of 4912 2416 Software V.1.3.exe 99 PID 2416 wrote to memory of 4912 2416 Software V.1.3.exe 99 PID 2416 wrote to memory of 4912 2416 Software V.1.3.exe 99 PID 2416 wrote to memory of 4912 2416 Software V.1.3.exe 99 PID 2416 wrote to memory of 4912 2416 Software V.1.3.exe 99 PID 2416 wrote to memory of 4912 2416 Software V.1.3.exe 99 PID 2416 wrote to memory of 4912 2416 Software V.1.3.exe 99 PID 2416 wrote to memory of 4912 2416 Software V.1.3.exe 99
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Software V.1.3.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\7zO43F04BAB\Software V.1.3.exe"C:\Users\Admin\AppData\Local\Temp\7zO43F04BAB\Software V.1.3.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\7zO43F04BAB\Software V.1.3.exe"C:\Users\Admin\AppData\Local\Temp\7zO43F04BAB\Software V.1.3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 4284⤵
- Program crash
PID:2820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 2763⤵
- Program crash
PID:3792
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO43F9473C\Software V.1.3.exe"C:\Users\Admin\AppData\Local\Temp\7zO43F9473C\Software V.1.3.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\7zO43F9473C\Software V.1.3.exe"C:\Users\Admin\AppData\Local\Temp\7zO43F9473C\Software V.1.3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 13164⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 13364⤵
- Program crash
PID:2008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 2923⤵
- Program crash
PID:4124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 852 -ip 8521⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3880 -ip 38801⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2416 -ip 24161⤵PID:1016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4912 -ip 49121⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4912 -ip 49121⤵PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD56506648b2ba754fdefd9191391c1adcf
SHA18b0b93d447a8ec23fd4c02a1db2785bbb72a9668
SHA2564e98854ce182fa51d79357bd6f135e7935c7ae4c9a60ddf41ace17967cb125d3
SHA512ee80ed1f8d7c8d3bfe487566b1c1df0a9c29f6df818d07c88bf2741f50dd3395987fa80b36c870055bad752d906c2f1864c670dff2281f0a77abd7c46a321ef0