Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
710KB
-
MD5
28e568616a7b792cac1726deb77d9039
-
SHA1
39890a418fb391b823ed5084533e2e24dff021e1
-
SHA256
9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
-
SHA512
85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
SSDEEP
12288:tyNudyx57oPuBlhyyZzWDtkfDdEIHiyO+rBlhyyZzWDtkfDdEIHiyO+N:t+3x5s2BCyqXIdXBCyqXId5
Malware Config
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
Extracted
lumma
https://drive-connect.cyou/api
https://covery-mover.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1288 set thread context of 1256 1288 file.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1144 1288 file.exe 83 PID 1288 wrote to memory of 1144 1288 file.exe 83 PID 1288 wrote to memory of 1144 1288 file.exe 83 PID 1288 wrote to memory of 4976 1288 file.exe 84 PID 1288 wrote to memory of 4976 1288 file.exe 84 PID 1288 wrote to memory of 4976 1288 file.exe 84 PID 1288 wrote to memory of 1256 1288 file.exe 85 PID 1288 wrote to memory of 1256 1288 file.exe 85 PID 1288 wrote to memory of 1256 1288 file.exe 85 PID 1288 wrote to memory of 1256 1288 file.exe 85 PID 1288 wrote to memory of 1256 1288 file.exe 85 PID 1288 wrote to memory of 1256 1288 file.exe 85 PID 1288 wrote to memory of 1256 1288 file.exe 85 PID 1288 wrote to memory of 1256 1288 file.exe 85 PID 1288 wrote to memory of 1256 1288 file.exe 85 PID 1288 wrote to memory of 1256 1288 file.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1256
-