Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
443f4cf9f362a96bbd0845ba6d2859f0.exe
Resource
win7-20240729-en
General
-
Target
443f4cf9f362a96bbd0845ba6d2859f0.exe
-
Size
781KB
-
MD5
443f4cf9f362a96bbd0845ba6d2859f0
-
SHA1
1bf75dea31eaf0c26da3428ae2b8518771989522
-
SHA256
e11c9223741b2d1291f1031539da3dd183ce2ac4b2de705d92366c6f61d94aa5
-
SHA512
f43bf238027dacc972e98caff32461c680aefe1197be827348bb8bd371f85456352fbebf5bffa2381f6496466da2acef549c01c4e06c8d52727539196755db9a
-
SSDEEP
24576:ErtEhokkSG46ZY4vaIAaCzxZY4vaIAaCzs:ErGhokkSG4kdCzvdCzs
Malware Config
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
Extracted
lumma
https://tacitglibbr.biz/api
Signatures
-
Lumma family
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4376 set thread context of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 443f4cf9f362a96bbd0845ba6d2859f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 443f4cf9f362a96bbd0845ba6d2859f0.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1332 443f4cf9f362a96bbd0845ba6d2859f0.exe 1332 443f4cf9f362a96bbd0845ba6d2859f0.exe 1332 443f4cf9f362a96bbd0845ba6d2859f0.exe 1332 443f4cf9f362a96bbd0845ba6d2859f0.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83 PID 4376 wrote to memory of 1332 4376 443f4cf9f362a96bbd0845ba6d2859f0.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\443f4cf9f362a96bbd0845ba6d2859f0.exe"C:\Users\Admin\AppData\Local\Temp\443f4cf9f362a96bbd0845ba6d2859f0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\443f4cf9f362a96bbd0845ba6d2859f0.exe"C:\Users\Admin\AppData\Local\Temp\443f4cf9f362a96bbd0845ba6d2859f0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1332
-