Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe
Resource
win7-20241010-en
General
-
Target
623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe
-
Size
1.9MB
-
MD5
ef949464dd8dc945ca3d997d2a1f5d49
-
SHA1
c68400fb4f02c0cd9ee27760931fefe7a1d3764e
-
SHA256
623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778
-
SHA512
781e0765988976ebea95e479032b2d072d1aec59f692f1ed0d04c773af567d69e4e53e110153c0e9f8fe566747bcb090ba38a3656eddaca25a0c310a3456da11
-
SSDEEP
49152:+pz3IaXn7fXnAXD0TVbTGkJWCI16GwE9NPPV:+pTXn7PAYx7QCwwEHV
Malware Config
Extracted
lumma
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 2212 vmhost.exe 2788 vmhost.exe -
Loads dropped DLL 12 IoCs
pid Process 2676 623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe 2212 vmhost.exe 2212 vmhost.exe 2212 vmhost.exe 2212 vmhost.exe 2212 vmhost.exe 2212 vmhost.exe 2788 vmhost.exe 2788 vmhost.exe 2788 vmhost.exe 2788 vmhost.exe 2788 vmhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2788 set thread context of 2708 2788 vmhost.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmhost.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2212 vmhost.exe 2788 vmhost.exe 2788 vmhost.exe 2708 cmd.exe 2708 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2788 vmhost.exe 2708 cmd.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2212 2676 623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe 30 PID 2676 wrote to memory of 2212 2676 623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe 30 PID 2676 wrote to memory of 2212 2676 623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe 30 PID 2676 wrote to memory of 2212 2676 623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe 30 PID 2212 wrote to memory of 2788 2212 vmhost.exe 31 PID 2212 wrote to memory of 2788 2212 vmhost.exe 31 PID 2212 wrote to memory of 2788 2212 vmhost.exe 31 PID 2212 wrote to memory of 2788 2212 vmhost.exe 31 PID 2788 wrote to memory of 2708 2788 vmhost.exe 32 PID 2788 wrote to memory of 2708 2788 vmhost.exe 32 PID 2788 wrote to memory of 2708 2788 vmhost.exe 32 PID 2788 wrote to memory of 2708 2788 vmhost.exe 32 PID 2788 wrote to memory of 2708 2788 vmhost.exe 32 PID 2708 wrote to memory of 2896 2708 cmd.exe 35 PID 2708 wrote to memory of 2896 2708 cmd.exe 35 PID 2708 wrote to memory of 2896 2708 cmd.exe 35 PID 2708 wrote to memory of 2896 2708 cmd.exe 35 PID 2708 wrote to memory of 2896 2708 cmd.exe 35 PID 2708 wrote to memory of 2896 2708 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe"C:\Users\Admin\AppData\Local\Temp\623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\vmhost.exe"C:\Users\Admin\AppData\Local\Temp\vmhost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\Signconfig_v2\vmhost.exeC:\Users\Admin\AppData\Roaming\Signconfig_v2\vmhost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023KB
MD57f987323249d0ee0dbf5d67883482ec1
SHA1ad6acbcecccfd90474abb9775e7be77aeaa030e7
SHA2567dde714630ea2aed576636e1eb0ec0f5babcd11b96ed898c714e725fe5efaebd
SHA512b144fa46f33162f9047a1f8126817b9b8d316a859472df2451ffdb65bff330624e4959ddff34255822bd64e3098de717fb00dbe7b153df6f8761148cce71331b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
46KB
MD576c9fbe132f5201921277a48b50cb4fb
SHA1702b8ed137bdc8504e04badd36e6ad49db060132
SHA2568bf0e15ab214313e35d3971ad736758d2f44bf68f758670ae5e6bf755a011568
SHA5122db057415e2e2f864be3b14883a51f876eac10d60e6c4bb50a96faf9bec143610e1dd50a42753ef37222df92d0252b8b6057b7c5e566a99782f04739bd1d7b8b
-
Filesize
1.0MB
MD51170e6f21225a2182942042074efd5aa
SHA1dabeb2af2dfeda137fcb82d48e2c4915b9d0f452
SHA2568394a39d0234dbc6eb765378691865d3146150a994d9c8f7b4a495d861e11f19
SHA5128e57cc90ab8a9c4b6bac6d77660d8f31fa12ae23fe2bb91cfd3765368574c98b886f4a554910a4c7e41ad846f3a394e7baa79715a5b614baf88e10ae76bb076c
-
Filesize
1.1MB
MD5862dfc9bf209a46d6f4874614a6631cc
SHA143216aae64df217cba009145b6f9ad5b97fe927a
SHA25684538f1aacebf9daad9fdb856611ab3d98a6d71c9ec79a8250eee694d2652a8b
SHA512b0611cd9ad441871cca62291913197257660390fa4ea8a26cb41dc343a8a27ae111762de40c6f50cae3e365d8891500fc6ad0571aa3cd3a77eb83d9d488d19a8
-
Filesize
87KB
MD5d1a21e38593fddba8e51ed6bf7acf404
SHA1759f16325f0920933ac977909b7fe261e0e129e6
SHA2566a64c9cb0904ed48ce0d5cda137fcfd6dd463d84681436ca647b195aa2038a7e
SHA5123f4390603cd68d949eb938c1599503fb1cbb1b8250638e0985fad2f40f08d5e45ea4a8c149e44a50c6aa9077054387c48f71b53bf06b713ca1e73a3d5a6a6c2e
-
Filesize
783KB
MD5710f1fe566827ca4abff9060d3fbc969
SHA1cd25136ab3c9f16c0d502c4e0d02b7d749708ce3
SHA256fe44bbd482a270808f7d2d25d26ab891c79ed1a0cd1bbfca0620b351e324d74b
SHA5121e4e31d554f31ae8581a897f81ba4be4076ae336af7af79de63ac8756478756fca92a0ec5bbcb494b00d0e772bbbe6d83d7f20aad5f1fca5fb0b2bbd826b235f
-
Filesize
617KB
MD565c3c2a741838474a592679cda346753
SHA1043d80766dd4e49d8dca6ac72b04e09b5491fdc9
SHA2564e5f2c54d9ecfe48999edfcce0de038948f8b20ff68e299c55d9a2d6f65713e8
SHA512e5d8b308586ffa914f46b6766217eb12ad759853d25108db06170b870d0e8947e2befabc2843f76cb864b0f0135a8f2163b7c93fe644b293789919d1d07c4079
-
Filesize
89KB
MD587c333cde9cd60e42abe42d588f15ab4
SHA123f800dfd6676e8258a5667cb510e7fa1abea137
SHA256ce4f43fd49011c402a52c5472a1eca574edfa6c2982da8a0e7d54e57d62d9323
SHA512d3e59ff737b7f408a00e53bc368a1bc878a623a4ec949729307aa9c5fccf993568972188f7d9c069476b95833a38f42f87d500cf17dc710088d108fe68252fd5
-
Filesize
77KB
MD5659dbfb6cad2836899bcb2c17cc5411a
SHA1f2e070ae58d9938abc88003a7e60dc5a4b33da56
SHA256132e2aaf6ba22738d79a027f967b865154f427eb5aa9c623dd4a2e9c0656e279
SHA5121625917a16e434451d468c851e8310e0c683edc08f434369e047a47868b14d80930181ab4cd101e287174b8442449336f27369403a929b7c33fbee3cae7b5ed6