Overview
overview
10Static
static
7frhasdtr.exe
windows7-x64
10frhasdtr.exe
windows10-2004-x64
10lumma.exe
windows7-x64
10lumma.exe
windows10-2004-x64
10picturefonts.exe
windows7-x64
7picturefonts.exe
windows10-2004-x64
7rundll.exe
windows7-x64
1rundll.exe
windows10-2004-x64
10setup.exe
windows7-x64
7setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 03:37
Behavioral task
behavioral1
Sample
frhasdtr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
frhasdtr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lumma.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
lumma.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
picturefonts.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
picturefonts.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
rundll.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
rundll.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
setup.exe
Resource
win7-20240708-en
General
-
Target
picturefonts.exe
-
Size
12.1MB
-
MD5
269a751b0c6d68cc39b2267c1592dae2
-
SHA1
2ead3153069297c67bb33c7a83e63d2721aa9f4d
-
SHA256
319d1dc217b7e83a85dd62cb2c066156ba5579087f11c991a99089606979ca28
-
SHA512
d8da3bf11287c5168544c3d39460b428252dd1f60f7777a3770bc537f89def019078f46b9695a78338bc227e67c902494912d36dcd046e2a514bd0bd96107929
-
SSDEEP
196608:K4V6se4m7QH0RD3noXrrj8dVtxqVjDdLMmGEMGHIr915DnjdZd:K4VtH0RD3oXryDxa5LBGlGHIrT5Tx/
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral6/memory/1108-1-0x0000000000280000-0x0000000000EA4000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1108 set thread context of 100 1108 picturefonts.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 3268 100 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language picturefonts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1108 picturefonts.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1108 wrote to memory of 100 1108 picturefonts.exe 82 PID 1108 wrote to memory of 100 1108 picturefonts.exe 82 PID 1108 wrote to memory of 100 1108 picturefonts.exe 82 PID 1108 wrote to memory of 100 1108 picturefonts.exe 82 PID 1108 wrote to memory of 100 1108 picturefonts.exe 82 PID 1108 wrote to memory of 100 1108 picturefonts.exe 82 PID 1108 wrote to memory of 100 1108 picturefonts.exe 82 PID 1108 wrote to memory of 100 1108 picturefonts.exe 82 PID 1108 wrote to memory of 100 1108 picturefonts.exe 82 PID 1108 wrote to memory of 100 1108 picturefonts.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\picturefonts.exe"C:\Users\Admin\AppData\Local\Temp\picturefonts.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 8883⤵
- Program crash
PID:3268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 100 -ip 1001⤵PID:4532