Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 14:35
Static task
static1
Behavioral task
behavioral1
Sample
Data.exe
Resource
win10v2004-20241007-en
General
-
Target
Data.exe
-
Size
5.0MB
-
MD5
74eef96b83495be873747419761cd5c7
-
SHA1
122c4d5a42aa8a2f459f1d24da4f332fc51ae7e9
-
SHA256
4e6b0e43f6c93746bf5b56dea3ac0f53a829be0241e92ce408d6fcc2b46aa696
-
SHA512
8d55888151751fd458527df71eeece567baf18ba902ee4d5131a7ddf1c58060da9fd935a2808700620a3ba8442ee2a2f0a897008a3e536495a2a2097b7542511
-
SSDEEP
98304:0qw/ZzYRr9FUZq1v4zuknXat48n9uweKPhkJzfAxkFp4GT3I:0qw/ZzApiZqSBm59IohmfA+/9M
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Data.exe -
Executes dropped EXE 4 IoCs
pid Process 4340 1.exe 3960 1.exe 1400 2.exe 1588 3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0007000000023cb5-37.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1400 2.exe 1400 2.exe 1400 2.exe 1400 2.exe 1400 2.exe 1400 2.exe 1400 2.exe 1400 2.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4340 3240 Data.exe 83 PID 3240 wrote to memory of 4340 3240 Data.exe 83 PID 3240 wrote to memory of 4340 3240 Data.exe 83 PID 4340 wrote to memory of 3960 4340 1.exe 90 PID 4340 wrote to memory of 3960 4340 1.exe 90 PID 4340 wrote to memory of 3960 4340 1.exe 90 PID 4340 wrote to memory of 3960 4340 1.exe 90 PID 4340 wrote to memory of 3960 4340 1.exe 90 PID 3240 wrote to memory of 1400 3240 Data.exe 92 PID 3240 wrote to memory of 1400 3240 Data.exe 92 PID 3240 wrote to memory of 1400 3240 Data.exe 92 PID 3240 wrote to memory of 1588 3240 Data.exe 99 PID 3240 wrote to memory of 1588 3240 Data.exe 99 PID 3240 wrote to memory of 1588 3240 Data.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Data.exe"C:\Users\Admin\AppData\Local\Temp\Data.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\3.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD562ba8324491035f19ded9fe60ab569f4
SHA12de7f572009a9748228408a9b5333f9d0310f345
SHA2561c335c0a507cefd5079b05ec8afb9c49d22da78ca0d5750ad70b7c313c1621bc
SHA51238166d1566eba81f55087c97186d8dd4dd138f7f78ba8b712f146bd225df1870530357a95b504cd6e3d46376af998d56608d0267fa7e178e66a391bf890c022b
-
Filesize
7.3MB
MD511b7f59cc5c6887fd8911951eecca91e
SHA16d58f449e6c42710ea9977bba2694258b08728e0
SHA2566a9826b7c93941c1cb5666e3a8c81aa258b1429a7e663555d45aad1002a039b3
SHA5126d139fc74028bca6437cf0b314850264dc2b2aaed73f759139ee54b6fa319a8da6cb67a944cbfa2fffcc73673b113a162b701b14bd08bc8444400199cc805545
-
Filesize
1.7MB
MD52276f61af5fd12e8264face69423d0d9
SHA19152f143e96657ad3994ce1e6a767ff91a298e9a
SHA256f3d05c70a91b4582bb90daea843af21fb257f1f9185f2a8ec318eae6dc77a037
SHA51285806e060cd13aac3224b62044d9e439ac2847c6a4482734f1ea39baadc93f5656beefc45429ec37e9e4b2b8f6a6af806e51e77a3b47cd1ebbe4c77c2422bcf1