Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 13:29
Behavioral task
behavioral1
Sample
8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe
Resource
win7-20240708-en
General
-
Target
8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe
-
Size
605KB
-
MD5
2816f592a20b55ac30849a92e6d61c00
-
SHA1
46eb22835a28b154dbf700416094ce22f8ff65f6
-
SHA256
8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12
-
SHA512
137c0cadf443a2525a710ea394f06312a4993eb1bb29db66f1e0a12778b68b8e370befd30702c7c465bf960d0361d264ec186dd12f2e2407adebc5508658334e
-
SSDEEP
12288:xvu/lxRkPqQBY0+B/7hmrOA1xO2nuhPxjnp:xvWJx7hmrOA3OLhPxjn
Malware Config
Extracted
lumma
https://spellshagey.biz/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3552 set thread context of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84 PID 3552 wrote to memory of 1160 3552 8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe"C:\Users\Admin\AppData\Local\Temp\8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
594KB
MD50a3568081bc0723afa5f7d8edd48cab2
SHA17be9930c4ef3a0ccc03a6b1610ebc39c539b3fc0
SHA2560954e49a50df01d9e50b19f0db627c965eb66fb51b1355b2309af3d1db0b7e92
SHA51231150e53b3842602d909e1503e32c42a731acf6d7df476ffbb7468ace291c4f9d337d6a5cf1ab732b55ad76f09d7d40d85c54d134484ae9b2782a5436284d8ee