Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe
Resource
win7-20240903-en
General
-
Target
f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe
-
Size
1.8MB
-
MD5
2c5731acf7a22df6528aa75185b8f14e
-
SHA1
d4ad6e16ee55deef42b64da81dbeb1fedfc03701
-
SHA256
f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352
-
SHA512
dd512b0d188ec1db5cfec6efb08bf365f9277dcd8374c6bbcb13055c2428a8adb8b9bcf83ec91f3dd314d75ff6b2a3db2c8e3ba85b8a434db9303ed6e1a34976
-
SSDEEP
49152:omB4vujun/cYnV4+TbrzAIfJ+ZAr3cyl6yiBERw0Xd:om6P/JnuybRRgAr3cyl6yiCG0t
Malware Config
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5E1VJGTFYJYYPY9C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5E1VJGTFYJYYPY9C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5E1VJGTFYJYYPY9C.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 5E1VJGTFYJYYPY9C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5E1VJGTFYJYYPY9C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5E1VJGTFYJYYPY9C.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HGU5ZSCOPQ1AKTFEEFC3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5E1VJGTFYJYYPY9C.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HGU5ZSCOPQ1AKTFEEFC3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5E1VJGTFYJYYPY9C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5E1VJGTFYJYYPY9C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HGU5ZSCOPQ1AKTFEEFC3.exe -
Executes dropped EXE 2 IoCs
pid Process 3400 5E1VJGTFYJYYPY9C.exe 2000 HGU5ZSCOPQ1AKTFEEFC3.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 5E1VJGTFYJYYPY9C.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine HGU5ZSCOPQ1AKTFEEFC3.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 5E1VJGTFYJYYPY9C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5E1VJGTFYJYYPY9C.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 3400 5E1VJGTFYJYYPY9C.exe 2000 HGU5ZSCOPQ1AKTFEEFC3.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5E1VJGTFYJYYPY9C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HGU5ZSCOPQ1AKTFEEFC3.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 3400 5E1VJGTFYJYYPY9C.exe 3400 5E1VJGTFYJYYPY9C.exe 2000 HGU5ZSCOPQ1AKTFEEFC3.exe 2000 HGU5ZSCOPQ1AKTFEEFC3.exe 3400 5E1VJGTFYJYYPY9C.exe 3400 5E1VJGTFYJYYPY9C.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3400 5E1VJGTFYJYYPY9C.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2508 wrote to memory of 3400 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 83 PID 2508 wrote to memory of 3400 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 83 PID 2508 wrote to memory of 3400 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 83 PID 2508 wrote to memory of 2000 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 84 PID 2508 wrote to memory of 2000 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 84 PID 2508 wrote to memory of 2000 2508 f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe"C:\Users\Admin\AppData\Local\Temp\f7c4623e11531dc98466b80de533eac519943fc5abd0f782eca5fda876db0352.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\5E1VJGTFYJYYPY9C.exe"C:\Users\Admin\AppData\Local\Temp\5E1VJGTFYJYYPY9C.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\HGU5ZSCOPQ1AKTFEEFC3.exe"C:\Users\Admin\AppData\Local\Temp\HGU5ZSCOPQ1AKTFEEFC3.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5a919de6f24a9f0a76ac28bf4e9de346c
SHA1fcdf3cb377ce29981f2bb58d9636118e83e71820
SHA256fd642db5b3c070110233f5a52a9bfa719c87cb34f0b12c2a383a6fb92a68e0fa
SHA5125e4273aa65a2542030435d0692eb9057c4142f9d1ab78fb16f9a83df10637e8ca62957c53c8c6feaee66c7561ca86054cda0faba13d42ddb542d6b3b4ea40177
-
Filesize
2.8MB
MD58b0e835b8c0ac0fb52fa46389ece67c5
SHA15b9ba3c57c999007f68a904a81c1fb568d0ca15f
SHA25677c7d257a6b07f93149a377e3e6847182fab3a3b7c1a8b16db0ef7736409414b
SHA512a94a3b09b0044dee8fa35a92772f8a4eb32d22a4c49d3a79960562eaf86f188f1bb8beabc15757f3858306f2fec3c7f252e899f647dd6cc5223be003ab8bb042