Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31/12/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
Release-x86.zip
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Release-x86.zip
Resource
win10v2004-20241007-en
General
-
Target
Release-x86.zip
-
Size
22.8MB
-
MD5
b702a938e2a59d94589f56643c6bcb97
-
SHA1
19948646f03568dff602218f966fa35591b11fbd
-
SHA256
6e9c872917def263d5e097fe5b2110c76ad72f5d6e87326a4d74ddcdb743ee36
-
SHA512
30500ccfec193a6ee9318cb67cee0e5e169c12dccd3f5d7df9983a2088a9317660fa8a9383df39d1e0b2a49db975fe915daa549459bc1ab98cad7eb8eb7b6b38
-
SSDEEP
393216:tDUC27fkAw2eSfr+zWRY/OGAD3XvrZXtX0ptC7Ye80AT4uCVucOEkAQa1dUI:tDZ27s729GhALv/kptC7YkAk5VuXEkA/
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 9 IoCs
pid Process 1868 Bootstrapper.exe 2112 Bootstrapper.exe 1732 Bootstrapper.exe 2404 Bootstrapper.exe 2952 Bootstrapper.exe 1936 Bootstrapper.exe 1880 Bootstrapper.exe 2800 Bootstrapper.exe 2680 Bootstrapper.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Bootstrapper.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2868 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2452 7zFM.exe 1868 Bootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeRestorePrivilege 2452 7zFM.exe Token: 35 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe 2452 7zFM.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2452 wrote to memory of 1868 2452 7zFM.exe 30 PID 2452 wrote to memory of 1868 2452 7zFM.exe 30 PID 2452 wrote to memory of 1868 2452 7zFM.exe 30 PID 2452 wrote to memory of 1868 2452 7zFM.exe 30 PID 2452 wrote to memory of 2112 2452 7zFM.exe 32 PID 2452 wrote to memory of 2112 2452 7zFM.exe 32 PID 2452 wrote to memory of 2112 2452 7zFM.exe 32 PID 2452 wrote to memory of 2112 2452 7zFM.exe 32 PID 2452 wrote to memory of 1732 2452 7zFM.exe 34 PID 2452 wrote to memory of 1732 2452 7zFM.exe 34 PID 2452 wrote to memory of 1732 2452 7zFM.exe 34 PID 2452 wrote to memory of 1732 2452 7zFM.exe 34 PID 2452 wrote to memory of 2404 2452 7zFM.exe 36 PID 2452 wrote to memory of 2404 2452 7zFM.exe 36 PID 2452 wrote to memory of 2404 2452 7zFM.exe 36 PID 2452 wrote to memory of 2404 2452 7zFM.exe 36 PID 2452 wrote to memory of 2952 2452 7zFM.exe 38 PID 2452 wrote to memory of 2952 2452 7zFM.exe 38 PID 2452 wrote to memory of 2952 2452 7zFM.exe 38 PID 2452 wrote to memory of 2952 2452 7zFM.exe 38 PID 2452 wrote to memory of 1936 2452 7zFM.exe 40 PID 2452 wrote to memory of 1936 2452 7zFM.exe 40 PID 2452 wrote to memory of 1936 2452 7zFM.exe 40 PID 2452 wrote to memory of 1936 2452 7zFM.exe 40 PID 2452 wrote to memory of 1880 2452 7zFM.exe 43 PID 2452 wrote to memory of 1880 2452 7zFM.exe 43 PID 2452 wrote to memory of 1880 2452 7zFM.exe 43 PID 2452 wrote to memory of 1880 2452 7zFM.exe 43 PID 2452 wrote to memory of 2800 2452 7zFM.exe 45 PID 2452 wrote to memory of 2800 2452 7zFM.exe 45 PID 2452 wrote to memory of 2800 2452 7zFM.exe 45 PID 2452 wrote to memory of 2800 2452 7zFM.exe 45 PID 2452 wrote to memory of 2680 2452 7zFM.exe 47 PID 2452 wrote to memory of 2680 2452 7zFM.exe 47 PID 2452 wrote to memory of 2680 2452 7zFM.exe 47 PID 2452 wrote to memory of 2680 2452 7zFM.exe 47 PID 2452 wrote to memory of 2868 2452 7zFM.exe 49 PID 2452 wrote to memory of 2868 2452 7zFM.exe 49 PID 2452 wrote to memory of 2868 2452 7zFM.exe 49
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Release-x86.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\7zO49992646\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO49992646\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\7zO49909FB6\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO49909FB6\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\7zO499D54B6\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO499D54B6\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\7zO49910886\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO49910886\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\7zO4995FD86\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO4995FD86\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\7zO499F0286\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO499F0286\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\7zO499DCFF6\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO499DCFF6\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\7zO499E96F6\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO499E96F6\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\7zO49968CC6\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO49968CC6\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO4998EDD6\config.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3d4abd5f44f1958f99df053f300c7c
SHA1a6e537e22fd60ab40b58add720b1018b2918a30e
SHA25692aeba8547136adcf5041cd5f5559a9a6339e4046cb574fca7623910ab4d1886
SHA512e53d9cb7f06757cfc47913bc5de6c02978712a7e3822c05c1f2c0889076deee239526d33aa780870539179bfab55d6e96be5a95a16f40921f91407c102a3ff8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105c0085e43ce86df65168971e54597f
SHA1701348e4b27046586d570423d17dc0ad5bbb859a
SHA2565d08620ba8345445cbf8acd11c52eeb78517ec236bc4be48a7ffa0ba648b66ea
SHA512247939c5422a9e54f6acf8454fc8a0bf9f3caa963b81efdacc27e7b46227b6d26441b22e15164b40d6197a993a016a8a595c568a4a1df9dc9aa838fb1f56d38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695bbec512d215c73a0d8a16ebded30c
SHA12f03118618eceaf07552016398a874432d75048e
SHA2564f1cce154089816ba489ca64d0c76f71d6b99f44defd34c5015e67343d28a24a
SHA512c62420870505ea10f43e6d9cc7a1b9ccfff567331cfde0b3ad74f592214ea26b4ebbc6de8d8924af44f502137727dec1307e3d52eba8db22722287d9dd95e8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbdf3cf6408f40ac537b917ae97cbb23
SHA11f0a1b4cc46c79c9704fe458a4477e1e0aead14e
SHA256541dea5bfb35eaf5f12a36b2265bfa8c5c0635b3e14867edd68ba817a571d1c0
SHA512ea9a56c607319088993d6978f9c8c56633ec707199308ae3adb55ae1ed5e9187d21f466b3f4fe7d6d2fc533d79dd95832009bb7206c57dbff04132e8ddf7ae4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac64d47f30f6daaf6fb939529e2a46f
SHA1513ae29ec1b2a37e815a4d82dcc3ca799a692db8
SHA2568f610c849189dbb322730b1df5af07002526378cdb92706ccf31f9d2c3a63362
SHA512b3eb218b766005ac1a4f1590fd7421f5ac46477fbbf2c6fd61ef5805a26bed361febfd25d493acf199b3661ec20b489b9cd281590902e0ae243ca46fbb175cf3
-
Filesize
220KB
MD596c673c9e9dedefec5fd5e27284e4f29
SHA11b5865f8998749a1fd61f62e6357d19dedcc9a2c
SHA256d92b9e01e24935e1cc6144734c0b39379edef1e3c06aedbd547dc304e7334d77
SHA5124ac805e8528f1003911960ce317150d186022a30dc31c479a54e1f6adbbf9cbce882da4b46f8cf0991c9e07fb4239f970d07c1538e4d16c79b560b5b272e5b83
-
Filesize
3.8MB
MD551a687c05051df6be8cfb12e3d9dbe05
SHA1e5c2ce613e7514e9ed4a5f87fc7ceff3d4261704
SHA2568d0685375b246e2e5a97ab56e66963756d8bd699a5415df907995802930ea5f3
SHA5129ca4237b7f1057ed99902f05698ebbc125350fcbfb441cc9881933939f061e7c82e507eb957f2100acb5ca3f73c19a6e39a3260f11a2bf06c2d18111d1f65d6c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b