Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 09:36
Static task
static1
1 signatures
General
-
Target
Neverlose.cc.exe
-
Size
54.5MB
-
MD5
fd8e94f50646325de0f502b98a9bcc2d
-
SHA1
5f26af6c0bc9e573abc0490827468e4165b05b19
-
SHA256
c3afdbc9b9ba8c77858d6fb4394721ed65a6f68731306ccb64f8c283cde26503
-
SHA512
bb4479107d3fbe0e6afcb981c63e4ec62ee445a829b1b0906a964dba7b703ac2a4d6935009d4b3738b26940c3ee4de70aba987a4548728f5eec1385bf1b2ea9b
-
SSDEEP
12288:23sPnKB1HitY7GwKKNLio3vp1wz+psXxilQmqNXey/i:28PnKrittwK+LB3vpSKislQmqNXE
Malware Config
Extracted
Family
lumma
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 632 2644 Neverlose.cc.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 3868 2644 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neverlose.cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neverlose.cc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2644 wrote to memory of 632 2644 Neverlose.cc.exe 84 PID 2644 wrote to memory of 632 2644 Neverlose.cc.exe 84 PID 2644 wrote to memory of 632 2644 Neverlose.cc.exe 84 PID 2644 wrote to memory of 632 2644 Neverlose.cc.exe 84 PID 2644 wrote to memory of 632 2644 Neverlose.cc.exe 84 PID 2644 wrote to memory of 632 2644 Neverlose.cc.exe 84 PID 2644 wrote to memory of 632 2644 Neverlose.cc.exe 84 PID 2644 wrote to memory of 632 2644 Neverlose.cc.exe 84 PID 2644 wrote to memory of 632 2644 Neverlose.cc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Neverlose.cc.exe"C:\Users\Admin\AppData\Local\Temp\Neverlose.cc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Neverlose.cc.exe"C:\Users\Admin\AppData\Local\Temp\Neverlose.cc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 3002⤵
- Program crash
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2644 -ip 26441⤵PID:3896