Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/12/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
BasesRow.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
BasesRow.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
BasesRow.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
BasesRow.exe
-
Size
696KB
-
MD5
5ff8f2113356c908d9b58d930f55f210
-
SHA1
e8b8b6e3feb904bf8e463b744f7763e172866c56
-
SHA256
7ff818c2d6bb4329ebc91219c45807e5b96e49bca7e0960a8b71e7e03b9cec60
-
SHA512
c407713e5155eb184bd78593bef578cbdfcb5a05be14ba3edfccf1a9af4a1cae9dee4eda1b64b96a851fc50515d58dfaaf8fa6bea063706fed17ee33fd67096d
-
SSDEEP
12288:YfVUl+WsI1nI1u6cP2YdeCpAYHwC8WkOEYhErDk5skbE22dEy3HG5N7FlFHlnGUt:sV6+WsgI8ReYtqcEOE95HGLBdGw
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://ingreem-eilish.biz/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 4192 BasesRow.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4192 set thread context of 1364 4192 BasesRow.exe 78 -
Program crash 1 IoCs
pid pid_target Process procid_target 3388 4192 WerFault.exe 76 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BasesRow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78 PID 4192 wrote to memory of 1364 4192 BasesRow.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\BasesRow.exe"C:\Users\Admin\AppData\Local\Temp\BasesRow.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 10762⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4192 -ip 41921⤵PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
437KB
MD5719b51d853f1d8a5b2d704db5736bee2
SHA1b274871c8e03dd13b2c1099763b3ecb919a751b1
SHA25656112f1fb0b4cb0d81bc58c8be898ad644b8e0fc3d2beac6635c200b69321aa2
SHA512dc25f57a88e1b1edc3b36e6ac543181bb1103b392f33b2e288e86cd68ab89f232dcf7328b030543336a0a5223674a4ee6959025e0d508e85af96636c97205fa8