Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169.exe
Resource
win7-20240903-en
General
-
Target
a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169.exe
-
Size
7.5MB
-
MD5
2ecb2b14a4050aa62a10231a8fff056f
-
SHA1
94d9c850d5086454e37a94b2e63a39d218406f60
-
SHA256
a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169
-
SHA512
f3a0c36dc2dde1dac59f1f2cc1e3bd4d71ea639c8161b37b23560db45870c0425d2f63adc2a57da12e5876b92bf6c044a3ee8744b26372ba10565796183ea890
-
SSDEEP
49152:Mn4yvqnGtmN5vpp3FiA7P27lyZAb9ly76tcPlRlrHm/JdY+RKM1GcJkoUXPsUXPS:MqTvLvrecZy9ly7T983kcOJk
Malware Config
Extracted
lumma
https://gentlewave.shop/api
Signatures
-
Lumma family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169.exepid process 4620 a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169.exe 4620 a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169.exe"C:\Users\Admin\AppData\Local\Temp\a2a2fa900f453f24a9bab2188d4f831be613c84191494b50fb6522af19e4f169.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4620