Analysis
-
max time kernel
33s -
max time network
21s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-01-2025 03:48
Static task
static1
Behavioral task
behavioral1
Sample
Data.exe
Resource
win10v2004-20241007-en
General
-
Target
Data.exe
-
Size
5.0MB
-
MD5
74eef96b83495be873747419761cd5c7
-
SHA1
122c4d5a42aa8a2f459f1d24da4f332fc51ae7e9
-
SHA256
4e6b0e43f6c93746bf5b56dea3ac0f53a829be0241e92ce408d6fcc2b46aa696
-
SHA512
8d55888151751fd458527df71eeece567baf18ba902ee4d5131a7ddf1c58060da9fd935a2808700620a3ba8442ee2a2f0a897008a3e536495a2a2097b7542511
-
SSDEEP
98304:0qw/ZzYRr9FUZq1v4zuknXat48n9uweKPhkJzfAxkFp4GT3I:0qw/ZzApiZqSBm59IohmfA+/9M
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 2.exe -
Executes dropped EXE 3 IoCs
pid Process 3456 1.exe 2556 1.exe 2412 2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x001a00000002aaef-37.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2412 2.exe 2412 2.exe 2412 2.exe 2412 2.exe 2412 2.exe 2412 2.exe 2412 2.exe 2412 2.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3456 2816 Data.exe 77 PID 2816 wrote to memory of 3456 2816 Data.exe 77 PID 2816 wrote to memory of 3456 2816 Data.exe 77 PID 3456 wrote to memory of 2556 3456 1.exe 80 PID 3456 wrote to memory of 2556 3456 1.exe 80 PID 3456 wrote to memory of 2556 3456 1.exe 80 PID 3456 wrote to memory of 2556 3456 1.exe 80 PID 3456 wrote to memory of 2556 3456 1.exe 80 PID 2816 wrote to memory of 2412 2816 Data.exe 81 PID 2816 wrote to memory of 2412 2816 Data.exe 81 PID 2816 wrote to memory of 2412 2816 Data.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Data.exe"C:\Users\Admin\AppData\Local\Temp\Data.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD562ba8324491035f19ded9fe60ab569f4
SHA12de7f572009a9748228408a9b5333f9d0310f345
SHA2561c335c0a507cefd5079b05ec8afb9c49d22da78ca0d5750ad70b7c313c1621bc
SHA51238166d1566eba81f55087c97186d8dd4dd138f7f78ba8b712f146bd225df1870530357a95b504cd6e3d46376af998d56608d0267fa7e178e66a391bf890c022b
-
Filesize
7.3MB
MD511b7f59cc5c6887fd8911951eecca91e
SHA16d58f449e6c42710ea9977bba2694258b08728e0
SHA2566a9826b7c93941c1cb5666e3a8c81aa258b1429a7e663555d45aad1002a039b3
SHA5126d139fc74028bca6437cf0b314850264dc2b2aaed73f759139ee54b6fa319a8da6cb67a944cbfa2fffcc73673b113a162b701b14bd08bc8444400199cc805545