Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 03:29
Static task
static1
Behavioral task
behavioral1
Sample
fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe
Resource
win7-20241010-en
General
-
Target
fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe
-
Size
806KB
-
MD5
741ee77540764d0c3eab3f6fa16f5f37
-
SHA1
89db0aca9e9db4cec292b77c9592e8f10626ed11
-
SHA256
fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2
-
SHA512
a1a44c2c59d74bf6c5c0d89fc45f8e9e1d4482d6882a8e6d02713dbbb9e346d7bd73289dfb9ddb682c3e91ac7b62153c66ac1799b81c54458a46f9b0f1115c3f
-
SSDEEP
12288:T3K1Pp+lMeB8fZ3/B+KI5sl+AAdd0tXQjZ3/B+KI5sl+AAdd0tXQJ:bK1PSMZRPB+A+AKdUgFPB+A+AKdUgJ
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84 PID 2672 wrote to memory of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84 PID 2672 wrote to memory of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84 PID 2672 wrote to memory of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84 PID 2672 wrote to memory of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84 PID 2672 wrote to memory of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84 PID 2672 wrote to memory of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84 PID 2672 wrote to memory of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84 PID 2672 wrote to memory of 3024 2672 fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe"C:\Users\Admin\AppData\Local\Temp\fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe"C:\Users\Admin\AppData\Local\Temp\fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3024
-