Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
ReploidReplic.exe
Resource
win7-20240903-en
General
-
Target
ReploidReplic.exe
-
Size
691KB
-
MD5
7db52dda50a584c20d69a00d2b13c63d
-
SHA1
12ed1950ad08b2e0dea8442d95b33e03de68ca8d
-
SHA256
0b571a24307780dc181fd657ee4a9d4fca6a4b2076636d793d906944e3a71e2e
-
SHA512
e756eeaecb12ecc5b8603fde6bc30855c860fb4494ff021bf6fbbd51c4012835841682a8af7beea513193e5eab177b79f651d7f891ae8bb71c79a04a4f583f32
-
SSDEEP
12288:CusYxZidn8TRgizG9KB7xZ/fTE2CRXR9Fr8uniH67hWi37sypczUPEj/lgxpR+JU:CusY7Y8TRPSKBjTE2CRXjFAbHoYs7
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://ingreem-eilish.biz/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 2700 ReploidReplic.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 5004 2700 ReploidReplic.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 4796 2700 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReploidReplic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84 PID 2700 wrote to memory of 5004 2700 ReploidReplic.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ReploidReplic.exe"C:\Users\Admin\AppData\Local\Temp\ReploidReplic.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 10282⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2700 -ip 27001⤵PID:3220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD51c162e86473ae4c3182f575e264bfa6b
SHA1b2841b93a1302bd9f67851d9fb7629cf536235a1
SHA256e66f19d801426502114bd3da645779b9c2d3acc06b83b4de5bcf0ec24e4c5f6c
SHA5126a6770d9a812bdb94be853da0e890b28ed6eb213e60fee2a9043d3c09346cf1e4bf92c1e0f0ecd69aaab5e61cb849e50d266aeaef2cc12c6f3b7266c0583042a