Analysis
-
max time kernel
64s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 19:48
Static task
static1
General
-
Target
Executor.exe
-
Size
792KB
-
MD5
75dfc1be445c34e87497c8c836f8e80c
-
SHA1
ab6c848389123e361b85881c57c497fb70b5a8ca
-
SHA256
d22c55b7f24804051af56755352755765debc2ab2d2e63649230640ee9ed32b3
-
SHA512
c37f38451b0327788bb26b5e74be88903c27f54ddb42b320a0d1b434755d8b6bc3789335454ffc8b3edbfa01fe110506785f00aa28d8e17436a8d893e7f58254
-
SSDEEP
24576:f4dPpQPmbJITNihMiT4HTJITNihMiT4Hd:wdPp/4IhMiTagIhMiTad
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3892 set thread context of 2168 3892 Executor.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Executor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3892 wrote to memory of 2168 3892 Executor.exe 85 PID 3892 wrote to memory of 2168 3892 Executor.exe 85 PID 3892 wrote to memory of 2168 3892 Executor.exe 85 PID 3892 wrote to memory of 2168 3892 Executor.exe 85 PID 3892 wrote to memory of 2168 3892 Executor.exe 85 PID 3892 wrote to memory of 2168 3892 Executor.exe 85 PID 3892 wrote to memory of 2168 3892 Executor.exe 85 PID 3892 wrote to memory of 2168 3892 Executor.exe 85 PID 3892 wrote to memory of 2168 3892 Executor.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Executor.exe"C:\Users\Admin\AppData\Local\Temp\Executor.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\Executor.exe"C:\Users\Admin\AppData\Local\Temp\Executor.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2168
-