Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-11-2024 14:17
Static task
static1
General
-
Target
Project.zip
-
Size
20.5MB
-
MD5
a1f7985aa4e8ed043c5f5659fe29806c
-
SHA1
3bfcb1b40849bd00e0e2d129a039194ea9e05b6f
-
SHA256
d3438f56143af509e7d43c832cb8a473fd93796739de148439980eb28f34db45
-
SHA512
1d2896cce7c47e3c43d5dbf2560db164ef659d8c41d38ce5898d1602cddd7121dcba36ac083db533b48ca03e29f2e7a723384b8eeefb38ed1c5047ce5f6e6a9d
-
SSDEEP
393216:7w8xf5zFKDUvkwq2q+oml7OnVEC6OcOFM2OWgJ2oZLgR8yUQhy0hnXWs:txR5MU8wC+om1OnVZ6OcOp7K2o1y8dQ5
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
Signatures
-
Lumma family
-
Executes dropped EXE 11 IoCs
Processes:
Executor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exepid Process 3584 Executor.exe 1408 Executor.exe 2396 Executor.exe 2608 Executor.exe 4880 Executor.exe 4904 Executor.exe 1440 Executor.exe 1712 Executor.exe 4228 Executor.exe 3160 Executor.exe 5016 Executor.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
Executor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exedescription pid Process procid_target PID 3584 set thread context of 2396 3584 Executor.exe 86 PID 2608 set thread context of 4880 2608 Executor.exe 89 PID 4904 set thread context of 1440 4904 Executor.exe 92 PID 1712 set thread context of 4228 1712 Executor.exe 95 PID 3160 set thread context of 5016 3160 Executor.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Executor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Executor.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid Process 3328 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exedescription pid Process Token: SeRestorePrivilege 3328 7zFM.exe Token: 35 3328 7zFM.exe Token: SeSecurityPrivilege 3328 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid Process 3328 7zFM.exe 3328 7zFM.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
Executor.exeExecutor.exeExecutor.exeExecutor.exeExecutor.exedescription pid Process procid_target PID 3584 wrote to memory of 1408 3584 Executor.exe 85 PID 3584 wrote to memory of 1408 3584 Executor.exe 85 PID 3584 wrote to memory of 1408 3584 Executor.exe 85 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 3584 wrote to memory of 2396 3584 Executor.exe 86 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 2608 wrote to memory of 4880 2608 Executor.exe 89 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 4904 wrote to memory of 1440 4904 Executor.exe 92 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 1712 wrote to memory of 4228 1712 Executor.exe 95 PID 3160 wrote to memory of 5016 3160 Executor.exe 98 PID 3160 wrote to memory of 5016 3160 Executor.exe 98 PID 3160 wrote to memory of 5016 3160 Executor.exe 98 PID 3160 wrote to memory of 5016 3160 Executor.exe 98 PID 3160 wrote to memory of 5016 3160 Executor.exe 98 PID 3160 wrote to memory of 5016 3160 Executor.exe 98 PID 3160 wrote to memory of 5016 3160 Executor.exe 98 PID 3160 wrote to memory of 5016 3160 Executor.exe 98 PID 3160 wrote to memory of 5016 3160 Executor.exe 98 PID 3160 wrote to memory of 5016 3160 Executor.exe 98
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Project.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3328
-
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"2⤵
- Executes dropped EXE
PID:1408
-
-
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4880
-
-
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4228
-
-
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\Desktop\Executor.exe"C:\Users\Admin\Desktop\Executor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD51af695d8c0d5762120ffbfa2af1ad32e
SHA10cd51490ff442abd5f26e885fc4ad5e53e99acfa
SHA2568a7ea1a90650ee281424ce332eaf559f42a72ebe488e72eee824ab3ed31327f1
SHA5128e63fd94183266a50f2827f6f818aae0f94966a0894e7845b0004865c4e618ad400f8732b72dc3e0a750170bb6eb0a4a2bd40dae6e1d810ca86e7256e85b792b