Analysis
-
max time kernel
63s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3.exe
Resource
win7-20241010-en
General
-
Target
bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3.exe
-
Size
3.8MB
-
MD5
ac0571edb2c48a0ad96316d995e38abc
-
SHA1
56f76fb3d48d1f1c15e70481cd75743b8e2d6a28
-
SHA256
bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3
-
SHA512
4078b4035aae258fd6e5e46a468dea927d00e1c8ca197acc88434a22f80e38fbf3215117d817f72ce554a2e7aa579b4baac3b3097d28d40bd8cf86deb8c5be0a
-
SSDEEP
49152:heTKQTT19BJwSoYubigHEepqHzoKyanqZB4nJAzImUTkDiLiUhT+CBeAs9:hefPHGHEeKoKyaqZa2zrRMs9
Malware Config
Extracted
lumma
https://w0rdergen1.cyou/api
Signatures
-
Lumma family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3.exetaskmgr.exepid process 432 bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3.exe 432 bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 4180 taskmgr.exe Token: SeSystemProfilePrivilege 4180 taskmgr.exe Token: SeCreateGlobalPrivilege 4180 taskmgr.exe Token: 33 4180 taskmgr.exe Token: SeIncBasePriorityPrivilege 4180 taskmgr.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
Processes:
taskmgr.exepid process 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe -
Suspicious use of SendNotifyMessage 55 IoCs
Processes:
taskmgr.exepid process 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe 4180 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3.exe"C:\Users\Admin\AppData\Local\Temp\bb9de58568867799c964de3c59a7e70a4c69703444126740dca59a8306ca9be3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:432
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4180