Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 02:03
Static task
static1
Behavioral task
behavioral1
Sample
1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe
Resource
win7-20240903-en
General
-
Target
1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe
-
Size
743KB
-
MD5
7177b0ba961ddd258ee9672d436d6b63
-
SHA1
cdb7aef7f7a05430d323c00d43fe98af4680fa28
-
SHA256
1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95
-
SHA512
df1b07f5d4ff53afc4547fb371af1393bafce2eec0cc96ab0ceeaeb4500a3e771f4d1b9c7936b86f38241abfdfb53c9cf2fff22d3a0e7006015f50c165c59078
-
SSDEEP
12288:RoA2sfoKrzzpKnToLX5y8anwFgBGOXtoTmDr1aVupsZTDfCc71FT/mI69puLam6q:n2sg0z2ToE8+Q8tpDr10fCETZ6
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4420 set thread context of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 4740 4420 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84 PID 4420 wrote to memory of 4936 4420 1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe"C:\Users\Admin\AppData\Local\Temp\1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 10282⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4420 -ip 44201⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD564c287959ff0dbd10db81bded030a3a1
SHA1acf88011455fc98d0de186520b4ddde5d1cf5f75
SHA256673e0efee492a6a82afcce12545c4a2d46a1e9e827c33b7a1e9f0a904656a458
SHA512d7ca03f8032e7c9d5882ead046c33388d5ebba5923abd95c3c535945ba4aa8a1fe6e47d116dd9376c6717a36bff5ac0d0dcfc599526a5fc89d81c3fd3b0517c2