Analysis
-
max time kernel
96s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
6QLvb9i.exe
Resource
win7-20240903-en
General
-
Target
6QLvb9i.exe
-
Size
895KB
-
MD5
c79ad67c0547a2c2f19268618331e4ad
-
SHA1
65a778a9ecf4e08bce37d3036e2797693edbbcaa
-
SHA256
7ed9c30302d9c77df46d0f85af2972484ea0a0c55bdea41a263d7a9a7e67a2ed
-
SHA512
9e6601eda66a89e5cfbcfaaa33cb1d06bd2b3caea8e71450b34e9f690d7853f5f377aa61602060136b926e7f052036384c972da07f69f1331f179bdfac96294a
-
SSDEEP
24576:OGEZcUhkBQHPB+A+AK5UgFPB+A+AK5UgJ:OG0cUhkqkAZbtAZb8
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 4120 1664 6QLvb9i.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6QLvb9i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6QLvb9i.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1664 wrote to memory of 4120 1664 6QLvb9i.exe 83 PID 1664 wrote to memory of 4120 1664 6QLvb9i.exe 83 PID 1664 wrote to memory of 4120 1664 6QLvb9i.exe 83 PID 1664 wrote to memory of 4120 1664 6QLvb9i.exe 83 PID 1664 wrote to memory of 4120 1664 6QLvb9i.exe 83 PID 1664 wrote to memory of 4120 1664 6QLvb9i.exe 83 PID 1664 wrote to memory of 4120 1664 6QLvb9i.exe 83 PID 1664 wrote to memory of 4120 1664 6QLvb9i.exe 83 PID 1664 wrote to memory of 4120 1664 6QLvb9i.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6QLvb9i.exe"C:\Users\Admin\AppData\Local\Temp\6QLvb9i.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\6QLvb9i.exe"C:\Users\Admin\AppData\Local\Temp\6QLvb9i.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4120
-