Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 13:29
Behavioral task
behavioral1
Sample
8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe
Resource
win7-20240708-en
General
-
Target
8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe
-
Size
605KB
-
MD5
2816f592a20b55ac30849a92e6d61c00
-
SHA1
46eb22835a28b154dbf700416094ce22f8ff65f6
-
SHA256
8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12
-
SHA512
137c0cadf443a2525a710ea394f06312a4993eb1bb29db66f1e0a12778b68b8e370befd30702c7c465bf960d0361d264ec186dd12f2e2407adebc5508658334e
-
SSDEEP
12288:xvu/lxRkPqQBY0+B/7hmrOA1xO2nuhPxjnp:xvWJx7hmrOA3OLhPxjn
Malware Config
Extracted
lumma
https://spellshagey.biz/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 2368 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
594KB
MD50a3568081bc0723afa5f7d8edd48cab2
SHA17be9930c4ef3a0ccc03a6b1610ebc39c539b3fc0
SHA2560954e49a50df01d9e50b19f0db627c965eb66fb51b1355b2309af3d1db0b7e92
SHA51231150e53b3842602d909e1503e32c42a731acf6d7df476ffbb7468ace291c4f9d337d6a5cf1ab732b55ad76f09d7d40d85c54d134484ae9b2782a5436284d8ee