Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
21/11/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
572KB
-
MD5
397228fd3907db6c1144ef0e5597b314
-
SHA1
147afb1fb37b7047f39ce2436225bb32e5601420
-
SHA256
4b79d59b0243ebf9c1daf598d23a16f5de8820c3c17eed22b4d6ce40835fdadf
-
SHA512
e29c661314c8bbbab264f04d1f6549dfd893b70181a446b3c564a18254ea8dac6e7f4d9a2e4818623381c939adef8ef3084849774a9f48e4a86d66aed3358649
-
SSDEEP
12288:9o3gygylSwAN2kLkhn23c7Abpzq/Dw3imKQJ4nTL35iDBrDEnch3m/71lr7v:i3gygnN2kLktsc7keDHQJqTk98r7v
Malware Config
Extracted
lumma
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
https://push-hook.cyou
Extracted
lumma
https://push-hook.cyou/api
https://librari-night.sbs/api
https://befall-sm0ker.sbs/api
https://owner-vacat10n.sbs/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3484 set thread context of 2444 3484 file.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2444 3484 file.exe 85 PID 3484 wrote to memory of 2444 3484 file.exe 85 PID 3484 wrote to memory of 2444 3484 file.exe 85 PID 3484 wrote to memory of 2444 3484 file.exe 85 PID 3484 wrote to memory of 2444 3484 file.exe 85 PID 3484 wrote to memory of 2444 3484 file.exe 85 PID 3484 wrote to memory of 2444 3484 file.exe 85 PID 3484 wrote to memory of 2444 3484 file.exe 85 PID 3484 wrote to memory of 2444 3484 file.exe 85 PID 3484 wrote to memory of 2444 3484 file.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2444
-