Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
4a9d3b5099ab214c2fc1ede02bb06bfe.exe
Resource
win7-20240903-en
General
-
Target
4a9d3b5099ab214c2fc1ede02bb06bfe.exe
-
Size
1.8MB
-
MD5
4a9d3b5099ab214c2fc1ede02bb06bfe
-
SHA1
a6e91b1ea99d9c531f0f42ac42782eb8bd499103
-
SHA256
c506ac55f61aac8aa988bf1d584988cc27faaa3ffd6a97625f5dc8f6debf9c93
-
SHA512
5c0c09f1f2db034188e42daf14778a30000128e5226ea7200b221de405493cdc98d4b60de2211de785497016f0f85cbdb7b4686c147f412d5cca974bbb26b588
-
SSDEEP
24576:bjbWLm0aiTvjFoAU56Q9409g9gp/tXVwdGh1hrXvYKsN1UM2aVr8uLsst6UoQGgV:bHrirMlphWGXD8J59nowXJPU
Malware Config
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" NIVKW2W8CFOG1D70XEF1CZW0CZG.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ U6920FF896A3C1LRIV7N7SXIP4K.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4a9d3b5099ab214c2fc1ede02bb06bfe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NIVKW2W8CFOG1D70XEF1CZW0CZG.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4a9d3b5099ab214c2fc1ede02bb06bfe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion U6920FF896A3C1LRIV7N7SXIP4K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion U6920FF896A3C1LRIV7N7SXIP4K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4a9d3b5099ab214c2fc1ede02bb06bfe.exe -
Executes dropped EXE 2 IoCs
pid Process 628 NIVKW2W8CFOG1D70XEF1CZW0CZG.exe 2772 U6920FF896A3C1LRIV7N7SXIP4K.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4a9d3b5099ab214c2fc1ede02bb06bfe.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine U6920FF896A3C1LRIV7N7SXIP4K.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" NIVKW2W8CFOG1D70XEF1CZW0CZG.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 628 NIVKW2W8CFOG1D70XEF1CZW0CZG.exe 2772 U6920FF896A3C1LRIV7N7SXIP4K.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a9d3b5099ab214c2fc1ede02bb06bfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NIVKW2W8CFOG1D70XEF1CZW0CZG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U6920FF896A3C1LRIV7N7SXIP4K.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 628 NIVKW2W8CFOG1D70XEF1CZW0CZG.exe 628 NIVKW2W8CFOG1D70XEF1CZW0CZG.exe 2772 U6920FF896A3C1LRIV7N7SXIP4K.exe 2772 U6920FF896A3C1LRIV7N7SXIP4K.exe 628 NIVKW2W8CFOG1D70XEF1CZW0CZG.exe 628 NIVKW2W8CFOG1D70XEF1CZW0CZG.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 628 NIVKW2W8CFOG1D70XEF1CZW0CZG.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 880 wrote to memory of 628 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 90 PID 880 wrote to memory of 628 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 90 PID 880 wrote to memory of 628 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 90 PID 880 wrote to memory of 2772 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 91 PID 880 wrote to memory of 2772 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 91 PID 880 wrote to memory of 2772 880 4a9d3b5099ab214c2fc1ede02bb06bfe.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a9d3b5099ab214c2fc1ede02bb06bfe.exe"C:\Users\Admin\AppData\Local\Temp\4a9d3b5099ab214c2fc1ede02bb06bfe.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\NIVKW2W8CFOG1D70XEF1CZW0CZG.exe"C:\Users\Admin\AppData\Local\Temp\NIVKW2W8CFOG1D70XEF1CZW0CZG.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\U6920FF896A3C1LRIV7N7SXIP4K.exe"C:\Users\Admin\AppData\Local\Temp\U6920FF896A3C1LRIV7N7SXIP4K.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD57cbf44cce3192be728af21ab4631de68
SHA1150dcf70ac86a64f731e9d382d907cfe8864bb34
SHA256ac345b4397b11b35b1726e14806b43abf3c6b241b44721dc848eee9d671fc3d5
SHA51239ea9a1c0bb9ad7b9abfcd47f605218508ef93ba30dd07ec86af1e7b69fb0d7c43ec35f7853842b6e6e428af0bfcd186e1d97c8ded61386d4b92f08690a4e99b
-
Filesize
2.8MB
MD5c47457332bef2f7d538492e41dbe426a
SHA1cc41dc3d77ed516fdcb22a90415303cd5f1da6ef
SHA256462feb1108da3f8026d92bc28fb4fb61d964b578c33f1f85cb4a026766dc2395
SHA51226cd29c30e9d0664960518a87d0e6abf7b1212f5522edd868260b14c1e53dd3400c38f9e9ee5f71aeac56fc952a488b2ddebf8850f34bd1b19c72d246b039ad8