Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 03:24
Static task
static1
Behavioral task
behavioral1
Sample
960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe
Resource
win7-20240903-en
General
-
Target
960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe
-
Size
522KB
-
MD5
138fcf999a87419be2c7e5e036601466
-
SHA1
7569a1444cd948145c966dbe0b47ffdb587f8681
-
SHA256
960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b
-
SHA512
afd574b7cf69012e1fd319c6e3825ff512c042c9917f5d7087ea88632516c9ab6bb30d48d465e18ba1be6e412a9ac728d609006af05df8577d7de2c938501c6d
-
SSDEEP
12288:DztE0u86qlmk/345zA7Fv6vsVOzm9t/Gzr9AskP6f:DO0uYlmsozAAvsYkGzrOw
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 372 set thread context of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31 PID 372 wrote to memory of 3052 372 960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe"C:\Users\Admin\AppData\Local\Temp\960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe"C:\Users\Admin\AppData\Local\Temp\960aa535a9712242c02a82c1f07530ae60e79bcbab15fcf0ebc6e7dbd636710b.exe"2⤵PID:3052
-