Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
443f4cf9f362a96bbd0845ba6d2859f0.exe
Resource
win7-20240729-en
General
-
Target
443f4cf9f362a96bbd0845ba6d2859f0.exe
-
Size
781KB
-
MD5
443f4cf9f362a96bbd0845ba6d2859f0
-
SHA1
1bf75dea31eaf0c26da3428ae2b8518771989522
-
SHA256
e11c9223741b2d1291f1031539da3dd183ce2ac4b2de705d92366c6f61d94aa5
-
SHA512
f43bf238027dacc972e98caff32461c680aefe1197be827348bb8bd371f85456352fbebf5bffa2381f6496466da2acef549c01c4e06c8d52727539196755db9a
-
SSDEEP
24576:ErtEhokkSG46ZY4vaIAaCzxZY4vaIAaCzs:ErGhokkSG4kdCzvdCzs
Malware Config
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2640 set thread context of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2668 2744 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 443f4cf9f362a96bbd0845ba6d2859f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 443f4cf9f362a96bbd0845ba6d2859f0.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2640 wrote to memory of 2744 2640 443f4cf9f362a96bbd0845ba6d2859f0.exe 31 PID 2744 wrote to memory of 2668 2744 443f4cf9f362a96bbd0845ba6d2859f0.exe 32 PID 2744 wrote to memory of 2668 2744 443f4cf9f362a96bbd0845ba6d2859f0.exe 32 PID 2744 wrote to memory of 2668 2744 443f4cf9f362a96bbd0845ba6d2859f0.exe 32 PID 2744 wrote to memory of 2668 2744 443f4cf9f362a96bbd0845ba6d2859f0.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\443f4cf9f362a96bbd0845ba6d2859f0.exe"C:\Users\Admin\AppData\Local\Temp\443f4cf9f362a96bbd0845ba6d2859f0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\443f4cf9f362a96bbd0845ba6d2859f0.exe"C:\Users\Admin\AppData\Local\Temp\443f4cf9f362a96bbd0845ba6d2859f0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 1483⤵
- Program crash
PID:2668
-
-