Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 21:57
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
381KB
-
MD5
e9f13d0b330a73ece569b6115d2ac4f0
-
SHA1
ae46dcc7a771c7adf161ddd0f48b6b5b5f22bfda
-
SHA256
9c4afe3e68312e44bbaa3f122a251bb087f72d94adf8d432bdd8382087086c92
-
SHA512
d1281ae02e0430d01339213c737c3aec2675b6a6983d6da170bc0afcaee1b70a89b654baa250d7e69211219f315a28ec22b5f7faa1ea5382144e7a85630bc267
-
SSDEEP
6144:72pwktDrDuMt4Bgj04zLS/70E7IodJ6vsVzsooEAPmIV49g2/GzrtXAlGSIxj76o:L4Cj45zA7Fv6vsVOzm9t/Gzr9AsVP6Qt
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://tirepublicerj.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4552 set thread context of 3092 4552 file.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 3676 4552 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4552 wrote to memory of 3976 4552 file.exe 84 PID 4552 wrote to memory of 3976 4552 file.exe 84 PID 4552 wrote to memory of 3976 4552 file.exe 84 PID 4552 wrote to memory of 4272 4552 file.exe 85 PID 4552 wrote to memory of 4272 4552 file.exe 85 PID 4552 wrote to memory of 4272 4552 file.exe 85 PID 4552 wrote to memory of 3092 4552 file.exe 86 PID 4552 wrote to memory of 3092 4552 file.exe 86 PID 4552 wrote to memory of 3092 4552 file.exe 86 PID 4552 wrote to memory of 3092 4552 file.exe 86 PID 4552 wrote to memory of 3092 4552 file.exe 86 PID 4552 wrote to memory of 3092 4552 file.exe 86 PID 4552 wrote to memory of 3092 4552 file.exe 86 PID 4552 wrote to memory of 3092 4552 file.exe 86 PID 4552 wrote to memory of 3092 4552 file.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:4272
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 7922⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4552 -ip 45521⤵PID:3548