Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/11/2024, 09:54
Static task
static1
General
-
Target
Phasmaphobia_ModMenu(SaveEditor) by ASLMANGA (ENZO).rar
-
Size
52.6MB
-
MD5
706ced88574417c34327dd6e9476ee69
-
SHA1
f83a57240147b3e0cf32b3b383794098b9c616af
-
SHA256
9ec8062fa17c921539901fb021262569984f043780a829782b4d3be6852ef118
-
SHA512
de03eaef3b58263f21c79397459a4be2b9d22a8c4ea22726759471d52f580c296c8c6d915fde2ac65567b1f6b349d839ca20a28db1a7ac0e80014b19f00c4623
-
SSDEEP
1572864:jjDsOF3PCRQrRvF1RGrxnmKNpILAzOtA3g:LLlvF1R4vaaw
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://dangerou5533.cyou
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 4188 Enzo_Installer.exe 2076 Enzo_Installer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2076 set thread context of 2060 2076 Enzo_Installer.exe 82 PID 4188 set thread context of 4436 4188 Enzo_Installer.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enzo_Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enzo_Installer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1704 7zFM.exe 1704 7zFM.exe 1704 7zFM.exe 1704 7zFM.exe 1704 7zFM.exe 1704 7zFM.exe 1704 7zFM.exe 1704 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1704 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 1704 7zFM.exe Token: 35 1704 7zFM.exe Token: SeSecurityPrivilege 1704 7zFM.exe Token: SeSecurityPrivilege 1704 7zFM.exe Token: SeSecurityPrivilege 1704 7zFM.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1704 7zFM.exe 1704 7zFM.exe 1704 7zFM.exe 1704 7zFM.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1704 wrote to memory of 4188 1704 7zFM.exe 78 PID 1704 wrote to memory of 4188 1704 7zFM.exe 78 PID 1704 wrote to memory of 4188 1704 7zFM.exe 78 PID 1704 wrote to memory of 2076 1704 7zFM.exe 81 PID 1704 wrote to memory of 2076 1704 7zFM.exe 81 PID 1704 wrote to memory of 2076 1704 7zFM.exe 81 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 2076 wrote to memory of 2060 2076 Enzo_Installer.exe 82 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83 PID 4188 wrote to memory of 4436 4188 Enzo_Installer.exe 83
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Phasmaphobia_ModMenu(SaveEditor) by ASLMANGA (ENZO).rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\7zO8A699B08\Enzo_Installer.exe"C:\Users\Admin\AppData\Local\Temp\7zO8A699B08\Enzo_Installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8A600578\Enzo_Installer.exe"C:\Users\Admin\AppData\Local\Temp\7zO8A600578\Enzo_Installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD5ce8f2d1f90a3a637d00c23de28dc1cde
SHA197c38222fec055ef5b96920f05a3fbfda3f2ecfe
SHA256eb0c6eed03b871e372e8758c221d17b48326ccd38df25b2efbd288c48da9fa18
SHA5123605bd1a43b76d83b1136538341d74a550d2300e66ea8bb0cfd8b0adf6464dba2db53b3015f28fd95ada5e5eda6cc09c839b3f918996819f8310f7e68f72fedb