Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
random.exe.2.exe
Resource
win7-20240903-en
General
-
Target
random.exe.2.exe
-
Size
1.8MB
-
MD5
f27c02c94206a5a0d4a9757a1fd227e8
-
SHA1
190e7db56069335863f6bdc512b471ec23a2e31a
-
SHA256
97a2a9c0ce9a191ac84e691df3f420cc0c690e9e14a029fdc9095cc2ed3490ec
-
SHA512
ccd6700d1dbd23442a7c51751d00e41c67de259c5cb21bc01faf8db0acbc99e977938f0eee62bb50cadc7c2012239609a5600707c48f4653deb16caf7588c00b
-
SSDEEP
49152:Wn123sUWoL8ctWSeYBB+RXjQ7e574aic0:828kcXTXBG
Malware Config
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection JJE4C0SEE3JXJVH9YR5D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" JJE4C0SEE3JXJVH9YR5D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" JJE4C0SEE3JXJVH9YR5D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" JJE4C0SEE3JXJVH9YR5D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" JJE4C0SEE3JXJVH9YR5D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" JJE4C0SEE3JXJVH9YR5D.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JJE4C0SEE3JXJVH9YR5D.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2PMB8628PSP9LWZZETER6UZLSQ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe.2.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JJE4C0SEE3JXJVH9YR5D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JJE4C0SEE3JXJVH9YR5D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2PMB8628PSP9LWZZETER6UZLSQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2PMB8628PSP9LWZZETER6UZLSQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe.2.exe -
Executes dropped EXE 2 IoCs
pid Process 2824 JJE4C0SEE3JXJVH9YR5D.exe 2336 2PMB8628PSP9LWZZETER6UZLSQ.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine random.exe.2.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine JJE4C0SEE3JXJVH9YR5D.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 2PMB8628PSP9LWZZETER6UZLSQ.exe -
Loads dropped DLL 3 IoCs
pid Process 1748 random.exe.2.exe 1748 random.exe.2.exe 1748 random.exe.2.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features JJE4C0SEE3JXJVH9YR5D.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" JJE4C0SEE3JXJVH9YR5D.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1748 random.exe.2.exe 2824 JJE4C0SEE3JXJVH9YR5D.exe 2336 2PMB8628PSP9LWZZETER6UZLSQ.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JJE4C0SEE3JXJVH9YR5D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2PMB8628PSP9LWZZETER6UZLSQ.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1748 random.exe.2.exe 1748 random.exe.2.exe 1748 random.exe.2.exe 1748 random.exe.2.exe 1748 random.exe.2.exe 2824 JJE4C0SEE3JXJVH9YR5D.exe 2336 2PMB8628PSP9LWZZETER6UZLSQ.exe 2824 JJE4C0SEE3JXJVH9YR5D.exe 2824 JJE4C0SEE3JXJVH9YR5D.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2824 JJE4C0SEE3JXJVH9YR5D.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2824 1748 random.exe.2.exe 31 PID 1748 wrote to memory of 2824 1748 random.exe.2.exe 31 PID 1748 wrote to memory of 2824 1748 random.exe.2.exe 31 PID 1748 wrote to memory of 2824 1748 random.exe.2.exe 31 PID 1748 wrote to memory of 2336 1748 random.exe.2.exe 32 PID 1748 wrote to memory of 2336 1748 random.exe.2.exe 32 PID 1748 wrote to memory of 2336 1748 random.exe.2.exe 32 PID 1748 wrote to memory of 2336 1748 random.exe.2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe.2.exe"C:\Users\Admin\AppData\Local\Temp\random.exe.2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\JJE4C0SEE3JXJVH9YR5D.exe"C:\Users\Admin\AppData\Local\Temp\JJE4C0SEE3JXJVH9YR5D.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\2PMB8628PSP9LWZZETER6UZLSQ.exe"C:\Users\Admin\AppData\Local\Temp\2PMB8628PSP9LWZZETER6UZLSQ.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5a91e703f6e05180d79cb0693d4de870d
SHA15681a283819fb7421d20e3ebee9accbf4c0b6429
SHA256baa95564008d8836029dc0f95dbf5fd86659c5b825f9f68d5f395b4aa56cece2
SHA5127d10379c555a0e07f15b601bfddf00177178a362d6a3694d57b59c683631634e5825d242392c326c166b2c9f0c0b9d756079e23019a4ac85a67b71e0ad9926ae
-
Filesize
1.6MB
MD548958e8a5082bc9d4d30683bd4706836
SHA171c408641d34ce6e6db32479c51218b5843d69ef
SHA2569fe00ba48a8e236f856bca6f761b70b52d59e71322e13141871717969f5c8566
SHA512cb9bf66f3c65335c3fe9aad7b213283ad90099424a422b2c35d3bc0acf81eaac529309e639d3a7518644f061196729669a8f8affa3f16177c560adaea36d3d76