Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 21:57
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
381KB
-
MD5
e9f13d0b330a73ece569b6115d2ac4f0
-
SHA1
ae46dcc7a771c7adf161ddd0f48b6b5b5f22bfda
-
SHA256
9c4afe3e68312e44bbaa3f122a251bb087f72d94adf8d432bdd8382087086c92
-
SHA512
d1281ae02e0430d01339213c737c3aec2675b6a6983d6da170bc0afcaee1b70a89b654baa250d7e69211219f315a28ec22b5f7faa1ea5382144e7a85630bc267
-
SSDEEP
6144:72pwktDrDuMt4Bgj04zLS/70E7IodJ6vsVzsooEAPmIV49g2/GzrtXAlGSIxj76o:L4Cj45zA7Fv6vsVOzm9t/Gzr9AsVP6Qt
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 1408 2296 file.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2688 2296 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 1408 2296 file.exe 32 PID 2296 wrote to memory of 2688 2296 file.exe 33 PID 2296 wrote to memory of 2688 2296 file.exe 33 PID 2296 wrote to memory of 2688 2296 file.exe 33 PID 2296 wrote to memory of 2688 2296 file.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 682⤵
- Program crash
PID:2688
-