Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 22:02
Static task
static1
Behavioral task
behavioral1
Sample
download.bin.exe
Resource
win7-20240903-en
General
-
Target
download.bin.exe
-
Size
1.1MB
-
MD5
47bd83617560c80c7e805b546ea2a258
-
SHA1
09daba42fcaba0481d72e26a201d4eb442a842b9
-
SHA256
ec8cd0b52b6d8839d69c9ceb691cd5a92d183394b749c5ba354d31e124cc4557
-
SHA512
1d916bb6927680a1b65c414a075caf2302a5375cad9a5d5be941a56c85a1f5996435a6dbdce8614964edd325b4530a926e506a043ebe5e8f942efd152a0f25b3
-
SSDEEP
24576:vBg/P8B5+B25I3e3LxT3huxT5TXyV7Jir8XLLAO+:vBS0425IO1xu15ToEobL2
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1660 created 3460 1660 download.bin.exe 56 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1660 set thread context of 2632 1660 download.bin.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language download.bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language download.bin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1660 download.bin.exe 1660 download.bin.exe 1660 download.bin.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1660 download.bin.exe Token: SeDebugPrivilege 1660 download.bin.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2632 1660 download.bin.exe 82 PID 1660 wrote to memory of 2632 1660 download.bin.exe 82 PID 1660 wrote to memory of 2632 1660 download.bin.exe 82 PID 1660 wrote to memory of 2632 1660 download.bin.exe 82 PID 1660 wrote to memory of 2632 1660 download.bin.exe 82 PID 1660 wrote to memory of 2632 1660 download.bin.exe 82 PID 1660 wrote to memory of 2632 1660 download.bin.exe 82 PID 1660 wrote to memory of 2632 1660 download.bin.exe 82 PID 1660 wrote to memory of 2632 1660 download.bin.exe 82 PID 1660 wrote to memory of 2632 1660 download.bin.exe 82
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\download.bin.exe"C:\Users\Admin\AppData\Local\Temp\download.bin.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\download.bin.exe"C:\Users\Admin\AppData\Local\Temp\download.bin.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2632
-