Analysis
-
max time kernel
95s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 03:34
Static task
static1
Behavioral task
behavioral1
Sample
e1db1b6bf9eab2058e82a23b0d3b0c3f330031faadfe1543c70cf3d6e376c1b5.dll
Resource
win7-20240903-en
General
-
Target
e1db1b6bf9eab2058e82a23b0d3b0c3f330031faadfe1543c70cf3d6e376c1b5.dll
-
Size
12.6MB
-
MD5
3ece60696919a5cbf74e1cdec92b70ad
-
SHA1
a806c22fcb6f00feedb2c74d51c4e8096dabacb6
-
SHA256
e1db1b6bf9eab2058e82a23b0d3b0c3f330031faadfe1543c70cf3d6e376c1b5
-
SHA512
8e5d34fdc92fc6bb41030e1b1ea5d3ea25accf089b926bc3898ce7423a7e15340e6b9ccdf477a1c3643ff069b18e724886a518e9c124981125a20f456fdaf6c2
-
SSDEEP
393216:HUbvFw+aSYUTqC5U/Ox56rTn5B13DMP0X:Hn+aLUTAU5mTn5z3DMP0X
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 10 IoCs
flow pid Process 16 2832 rundll32.exe 20 2832 rundll32.exe 26 2832 rundll32.exe 28 2832 rundll32.exe 32 2832 rundll32.exe 36 2832 rundll32.exe 43 2832 rundll32.exe 49 2832 rundll32.exe 59 2832 rundll32.exe 63 2832 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4248 5044 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2384 wrote to memory of 5044 2384 rundll32.exe 82 PID 2384 wrote to memory of 5044 2384 rundll32.exe 82 PID 2384 wrote to memory of 5044 2384 rundll32.exe 82 PID 5044 wrote to memory of 2832 5044 rundll32.exe 83 PID 5044 wrote to memory of 2832 5044 rundll32.exe 83 PID 5044 wrote to memory of 2832 5044 rundll32.exe 83 PID 5044 wrote to memory of 2832 5044 rundll32.exe 83 PID 5044 wrote to memory of 2832 5044 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1db1b6bf9eab2058e82a23b0d3b0c3f330031faadfe1543c70cf3d6e376c1b5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1db1b6bf9eab2058e82a23b0d3b0c3f330031faadfe1543c70cf3d6e376c1b5.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 6243⤵
- Program crash
PID:4248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5044 -ip 50441⤵PID:3408