Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
pycharm 2020.1 crack with license key latest free download (mac win).exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
pycharm 2020.1 crack with license key latest free download (mac win).exe
Resource
win10v2004-20241007-en
General
-
Target
pycharm 2020.1 crack with license key latest free download (mac win).exe
-
Size
901.2MB
-
MD5
4aa34a6dcee31a6f0291cd280d792638
-
SHA1
b306b724fcd0fe4c682c7b2f1ca2d391fdf02d70
-
SHA256
dcbe5ba793cff144afefb4b52632520f6ec5be31e007267bb861c3d429bfbc2d
-
SHA512
7e7657524b8a407ad4f4d228e73269f604ed9c219362995301bb3de96f59747f8cbd443f16d27bb3a79de357d6af7ae0e860239f8ad738b58057be14acb6dd57
-
SSDEEP
196608:IP5DkvoHey5Pld/U1vDPZnwlH84zcz3ntQMt7LrDNDGsSLJa5BrRk:IWyeWT/URZwFzcz3tQogP2
Malware Config
Extracted
lumma
https://gentlewave.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
Processes:
Efficiency.compid process 1316 Efficiency.com -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2792 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 2416 tasklist.exe 1004 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tasklist.exetasklist.execmd.exeEfficiency.compycharm 2020.1 crack with license key latest free download (mac win).exefindstr.execmd.exechoice.execmd.exefindstr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efficiency.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pycharm 2020.1 crack with license key latest free download (mac win).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
Processes:
Efficiency.comdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Efficiency.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Efficiency.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Efficiency.com -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Efficiency.compid process 1316 Efficiency.com 1316 Efficiency.com 1316 Efficiency.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tasklist.exetasklist.exedescription pid process Token: SeDebugPrivilege 1004 tasklist.exe Token: SeDebugPrivilege 2416 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Efficiency.compid process 1316 Efficiency.com 1316 Efficiency.com 1316 Efficiency.com -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Efficiency.compid process 1316 Efficiency.com 1316 Efficiency.com 1316 Efficiency.com -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
pycharm 2020.1 crack with license key latest free download (mac win).execmd.exedescription pid process target process PID 2496 wrote to memory of 2792 2496 pycharm 2020.1 crack with license key latest free download (mac win).exe cmd.exe PID 2496 wrote to memory of 2792 2496 pycharm 2020.1 crack with license key latest free download (mac win).exe cmd.exe PID 2496 wrote to memory of 2792 2496 pycharm 2020.1 crack with license key latest free download (mac win).exe cmd.exe PID 2496 wrote to memory of 2792 2496 pycharm 2020.1 crack with license key latest free download (mac win).exe cmd.exe PID 2792 wrote to memory of 1004 2792 cmd.exe tasklist.exe PID 2792 wrote to memory of 1004 2792 cmd.exe tasklist.exe PID 2792 wrote to memory of 1004 2792 cmd.exe tasklist.exe PID 2792 wrote to memory of 1004 2792 cmd.exe tasklist.exe PID 2792 wrote to memory of 1176 2792 cmd.exe findstr.exe PID 2792 wrote to memory of 1176 2792 cmd.exe findstr.exe PID 2792 wrote to memory of 1176 2792 cmd.exe findstr.exe PID 2792 wrote to memory of 1176 2792 cmd.exe findstr.exe PID 2792 wrote to memory of 2416 2792 cmd.exe tasklist.exe PID 2792 wrote to memory of 2416 2792 cmd.exe tasklist.exe PID 2792 wrote to memory of 2416 2792 cmd.exe tasklist.exe PID 2792 wrote to memory of 2416 2792 cmd.exe tasklist.exe PID 2792 wrote to memory of 1696 2792 cmd.exe findstr.exe PID 2792 wrote to memory of 1696 2792 cmd.exe findstr.exe PID 2792 wrote to memory of 1696 2792 cmd.exe findstr.exe PID 2792 wrote to memory of 1696 2792 cmd.exe findstr.exe PID 2792 wrote to memory of 3036 2792 cmd.exe cmd.exe PID 2792 wrote to memory of 3036 2792 cmd.exe cmd.exe PID 2792 wrote to memory of 3036 2792 cmd.exe cmd.exe PID 2792 wrote to memory of 3036 2792 cmd.exe cmd.exe PID 2792 wrote to memory of 812 2792 cmd.exe cmd.exe PID 2792 wrote to memory of 812 2792 cmd.exe cmd.exe PID 2792 wrote to memory of 812 2792 cmd.exe cmd.exe PID 2792 wrote to memory of 812 2792 cmd.exe cmd.exe PID 2792 wrote to memory of 1316 2792 cmd.exe Efficiency.com PID 2792 wrote to memory of 1316 2792 cmd.exe Efficiency.com PID 2792 wrote to memory of 1316 2792 cmd.exe Efficiency.com PID 2792 wrote to memory of 1316 2792 cmd.exe Efficiency.com PID 2792 wrote to memory of 1916 2792 cmd.exe choice.exe PID 2792 wrote to memory of 1916 2792 cmd.exe choice.exe PID 2792 wrote to memory of 1916 2792 cmd.exe choice.exe PID 2792 wrote to memory of 1916 2792 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pycharm 2020.1 crack with license key latest free download (mac win).exe"C:\Users\Admin\AppData\Local\Temp\pycharm 2020.1 crack with license key latest free download (mac win).exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Brunei Brunei.cmd & Brunei.cmd2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"3⤵
- System Location Discovery: System Language Discovery
PID:1176
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2562673⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Ecological + ..\Something + ..\Consulting + ..\Coffee + ..\Underlying + ..\Employee Q3⤵
- System Location Discovery: System Language Discovery
PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\256267\Efficiency.comEfficiency.com Q3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1316
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5d7ba2d169be2aaedb58fc6ae7cf950f6
SHA1255eb0d67c724a97ab32d16600b7aeb79d26b6eb
SHA256dc3ee8ea7f6e1792c4578ad893d579d8165c7d3a9b4ebe61dc27934c5584f66c
SHA512c17940b5b7aae805ea6a50df945594ff4ec10a85c3cfedbf25a3b333880ff9c1cdc2cbbca5518c6b750ccc00373450959e765a57a47f5c8900053ea0c44d4445
-
Filesize
26KB
MD586e6ea095e903b5bc2f36fb64165b2ce
SHA1ff26105ec6f2efde2fb61173050b89a927441344
SHA2565106b66e910cdb8b52b819e837c6de4f7ee2aac2d53bc7355db878d4870f1943
SHA5125b1503818a69d4c9eadc91d777b33140b8645b953589604055b3865d3f8884008e645bfee4cffa98170c7734e1f2a0a223b12066721b0ea08066b210bf0cfc54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
90KB
MD577b12c07393313514e6184a375226839
SHA1a2cc46f4ae51be33f1b24617b413dea8d29921f9
SHA2566f600615a3d1b8a10ff91359d07cb9ad9404eafc28ba736d68de006750bfbf94
SHA512b7d255852842c949d445f2e47f78eb64c801ecb2aae3e707611fa364f888a494afdb5f9dd0b634e9c13aaaf331cb5c4fe48cd8c797fd128526b7e509caf0c689
-
Filesize
96KB
MD5c7ef51a71d4fbe8f838dff23ed1e4929
SHA1237460f0401758a8fb75223fad5d299db604802f
SHA25690d8a2506d381ea6240096caace82498f5f599c5d32201b0a256ca2934d2ffd2
SHA512ddd6b16448b6990dd2724e8160b0d22396ad724a405fcf62ca524169baeefbf69debae87357697c758902b5163b2e3fa62336663083b69adfd6d52031a2d7984
-
Filesize
84KB
MD5fb009fe95c1dffc3f8b7daca36dc083c
SHA1a977cffa508c9b82336f455c8e63a28ef8bd6743
SHA25694c1594b3ae252690085351f921e038c1289eb4fed65ee75b13d6508ecb7bbdb
SHA51235a85aca09ecce4dc48fa487c7bf1e576c7ecfa96c95a02b392275ca8f863c280b36a398686b39e83b696647e716023542288d6f78343118a1673726599db50d
-
Filesize
73KB
MD5740f5cf5643564318a4747d09604a4a1
SHA134f98a599c95e9dd4d6dd4ba674ea1c04f1d1971
SHA2562577c1d66fdeca2e80cbce1baab50286c4df8389b2e5acd5f072e0b9fee1d5e1
SHA5129860921682950ef22f733aa206dc99c3698994198d9f8b764ae6430d930f86844da798c431ef70513f0b4b49a4ab30aad9926c51f7820bdc0fdc67bdb6c0b55d
-
Filesize
53KB
MD5983f92437d97fb0ac3ae37567de237f8
SHA15dbca1ccea8eeb92da994268ffd66f5ec09c7f50
SHA25694d661e8ea870ce2e28f4952e641e1ed47a7ef029816bdc6619d3cd12fc58bcd
SHA5127c046b6ad03defc6b37bf028cb8888b45a5271a02448a06b73f6e74468b88966ed396b734c8f6cdc6ac4078e295c96bd9f68de793e2dd13fd95a9f494220f919
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
88KB
MD577614c997a197c9f65c41c4d76d5cf8e
SHA1f1dd2a60753c8329752e6615c26b91910b4dda04
SHA25691eb447971a2908f28d7b49febe467ce5e4568df479a8b1a4856ae7214b08fd5
SHA5129bc88fe4f3c8935cc4fab8b68662edc3ab3b3110add22cf76abd2b5ad27ed6c84d325a7c0d3a9edcb0fe14a750983c6c92c974902c22436af4beb294f5a7bc45