Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe
Resource
win7-20240903-en
General
-
Target
f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe
-
Size
1.8MB
-
MD5
2c5731acf7a22df6528aa75185b8f14e
-
SHA1
d4ad6e16ee55deef42b64da81dbeb1fedfc03701
-
SHA256
f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352
-
SHA512
dd512b0d188ec1db5cfec6efb08bf365f9277dcd8374c6bbcb13055c2428a8adb8b9bcf83ec91f3dd314d75ff6b2a3db2c8e3ba85b8a434db9303ed6e1a34976
-
SSDEEP
49152:omB4vujun/cYnV4+TbrzAIfJ+ZAr3cyl6yiBERw0Xd:om6P/JnuybRRgAr3cyl6yiCG0t
Malware Config
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection G6Z69WSDHFT42GV9YGJU34YNMFUN.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ OF7SNOSNS8IP3SYSMH.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OF7SNOSNS8IP3SYSMH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OF7SNOSNS8IP3SYSMH.exe -
Executes dropped EXE 2 IoCs
pid Process 2700 G6Z69WSDHFT42GV9YGJU34YNMFUN.exe 2668 OF7SNOSNS8IP3SYSMH.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine OF7SNOSNS8IP3SYSMH.exe -
Loads dropped DLL 3 IoCs
pid Process 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" G6Z69WSDHFT42GV9YGJU34YNMFUN.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2700 G6Z69WSDHFT42GV9YGJU34YNMFUN.exe 2668 OF7SNOSNS8IP3SYSMH.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G6Z69WSDHFT42GV9YGJU34YNMFUN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OF7SNOSNS8IP3SYSMH.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2700 G6Z69WSDHFT42GV9YGJU34YNMFUN.exe 2700 G6Z69WSDHFT42GV9YGJU34YNMFUN.exe 2700 G6Z69WSDHFT42GV9YGJU34YNMFUN.exe 2668 OF7SNOSNS8IP3SYSMH.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 G6Z69WSDHFT42GV9YGJU34YNMFUN.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2700 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 32 PID 2832 wrote to memory of 2700 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 32 PID 2832 wrote to memory of 2700 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 32 PID 2832 wrote to memory of 2700 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 32 PID 2832 wrote to memory of 2668 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 33 PID 2832 wrote to memory of 2668 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 33 PID 2832 wrote to memory of 2668 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 33 PID 2832 wrote to memory of 2668 2832 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe"C:\Users\Admin\AppData\Local\Temp\f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\G6Z69WSDHFT42GV9YGJU34YNMFUN.exe"C:\Users\Admin\AppData\Local\Temp\G6Z69WSDHFT42GV9YGJU34YNMFUN.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\OF7SNOSNS8IP3SYSMH.exe"C:\Users\Admin\AppData\Local\Temp\OF7SNOSNS8IP3SYSMH.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD51834fd0a9d839041b623e78a444005ff
SHA12eba3d690721acebe7cdf339ed47e4c1be15e905
SHA256e1ac3513342f92bc600fde6c4272210039d3641073351483f6603cce86506a2e
SHA5125cde4c971ffa6ac93e9747cbc7d7dcd9c44fe759486129e3f868a22ee61a3d361431c95b7c0db53a3872489a06e23ae37955effeb2514c26f8bdc37d5d212bfe
-
Filesize
1.7MB
MD59398db09151d852106049da4589c336a
SHA1c878de0293e96d37032b0f946fb284c9dda18988
SHA25621b64a9576afa3a6c7700d82f525997ee007722faf1f2944b6dc4fdf2a65fcaf
SHA5121050852914a054b2b9e38bde66d504a75c75657e4a61a68e1869286b48589b985db1400ceccfe98f2526b60118758346e64b78b7f0410b1519cece37d4ec035f