Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe
Resource
win7-20241023-en
General
-
Target
35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe
-
Size
6.8MB
-
MD5
af8f4b24943a56c36283c58af92a66d2
-
SHA1
97d2342d59a890a5c1645efeb275e3ad4f061f78
-
SHA256
35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c
-
SHA512
a48e5f7dd95e74dfa85c4d2672f32c55160e659666a6370afb0d05dfb51a899459c127a8e53af1736cc230c0fdc2b48d2c04ce0a8c53e922c0c749972aa07c2a
-
SSDEEP
98304:hzjqYyXE93kfPo9/f0VO/ATX49tpaw0evffz9Ura1pUN5GrqDfTndUbf+W7:J0XECf2sVJInrfz8a1ItDfTdUbf+W7
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4784 set thread context of 4444 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 98 PID 4784 set thread context of 2368 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 99 PID 4444 set thread context of 1884 4444 InstallUtil.exe 100 -
Program crash 1 IoCs
pid pid_target Process procid_target 3772 2368 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 4444 InstallUtil.exe 4444 InstallUtil.exe 4444 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe Token: SeDebugPrivilege 4444 InstallUtil.exe Token: SeDebugPrivilege 2368 InstallUtil.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4784 wrote to memory of 2372 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 93 PID 4784 wrote to memory of 2372 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 93 PID 4784 wrote to memory of 2372 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 93 PID 4784 wrote to memory of 2372 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 93 PID 4784 wrote to memory of 2372 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 93 PID 4784 wrote to memory of 2372 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 93 PID 4784 wrote to memory of 2372 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 93 PID 4784 wrote to memory of 2372 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 93 PID 4784 wrote to memory of 1740 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 94 PID 4784 wrote to memory of 1740 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 94 PID 4784 wrote to memory of 1740 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 94 PID 4784 wrote to memory of 1740 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 94 PID 4784 wrote to memory of 1740 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 94 PID 4784 wrote to memory of 1740 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 94 PID 4784 wrote to memory of 1740 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 94 PID 4784 wrote to memory of 1740 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 94 PID 4784 wrote to memory of 4444 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 98 PID 4784 wrote to memory of 4444 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 98 PID 4784 wrote to memory of 4444 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 98 PID 4784 wrote to memory of 4444 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 98 PID 4784 wrote to memory of 4444 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 98 PID 4784 wrote to memory of 4444 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 98 PID 4784 wrote to memory of 4444 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 98 PID 4784 wrote to memory of 4444 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 98 PID 4784 wrote to memory of 2368 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 99 PID 4784 wrote to memory of 2368 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 99 PID 4784 wrote to memory of 2368 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 99 PID 4784 wrote to memory of 2368 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 99 PID 4784 wrote to memory of 2368 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 99 PID 4784 wrote to memory of 2368 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 99 PID 4784 wrote to memory of 2368 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 99 PID 4784 wrote to memory of 2368 4784 35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe 99 PID 4444 wrote to memory of 1884 4444 InstallUtil.exe 100 PID 4444 wrote to memory of 1884 4444 InstallUtil.exe 100 PID 4444 wrote to memory of 1884 4444 InstallUtil.exe 100 PID 4444 wrote to memory of 1884 4444 InstallUtil.exe 100 PID 4444 wrote to memory of 1884 4444 InstallUtil.exe 100 PID 4444 wrote to memory of 1884 4444 InstallUtil.exe 100 PID 4444 wrote to memory of 1884 4444 InstallUtil.exe 100 PID 4444 wrote to memory of 1884 4444 InstallUtil.exe 100 PID 4444 wrote to memory of 1884 4444 InstallUtil.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe"C:\Users\Admin\AppData\Local\Temp\35bfacbefd16ff1a1b942c068a3509ab21b08b830b30ebf659fe83a6d6c8817c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:2372
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:1740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1884
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 9883⤵
- Program crash
PID:3772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2368 -ip 23681⤵PID:1688