Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 04:08
Static task
static1
Behavioral task
behavioral1
Sample
COD BO6 Unlock All Tool (Updated by ASLMANGA).rar
Resource
win7-20240729-en
General
-
Target
COD BO6 Unlock All Tool (Updated by ASLMANGA).rar
-
Size
64.0MB
-
MD5
f82308e7d129d69e3857cf7d43752998
-
SHA1
d435e26ae697d588ebbf964a0b182758fd26ac10
-
SHA256
6b31b6925e503a232a11850292bf85141325b674ca30bf258e3326179569339a
-
SHA512
47836df85a04816bdd65d25f1f50264f67f81d966b63aa38c6dec5310cf0efea5e7db82e95d178f58f46f33b8ce5b7bc6e7e4d22167fde6439385e231628093a
-
SSDEEP
1572864:XHlxbxUWTt0mn91iPReAS2/bXowzajgo177cfaY:TbeWSmn98A/2/bXrLoFcf
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 4 IoCs
pid Process 2276 Unlocker.exe 1380 Unlocker.exe 4696 Unlocker.exe 448 Unlocker.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2276 set thread context of 2096 2276 Unlocker.exe 107 PID 1380 set thread context of 860 1380 Unlocker.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlocker.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3980 7zFM.exe 3980 7zFM.exe 3980 7zFM.exe 3980 7zFM.exe 3980 7zFM.exe 3980 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3980 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 3980 7zFM.exe Token: 35 3980 7zFM.exe Token: SeSecurityPrivilege 3980 7zFM.exe Token: SeSecurityPrivilege 3980 7zFM.exe Token: SeSecurityPrivilege 3980 7zFM.exe Token: SeSecurityPrivilege 3980 7zFM.exe Token: SeSecurityPrivilege 3980 7zFM.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3980 7zFM.exe 3980 7zFM.exe 3980 7zFM.exe 3980 7zFM.exe 3980 7zFM.exe 3980 7zFM.exe 3980 7zFM.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3980 wrote to memory of 2276 3980 7zFM.exe 101 PID 3980 wrote to memory of 2276 3980 7zFM.exe 101 PID 3980 wrote to memory of 2276 3980 7zFM.exe 101 PID 3980 wrote to memory of 1380 3980 7zFM.exe 104 PID 3980 wrote to memory of 1380 3980 7zFM.exe 104 PID 3980 wrote to memory of 1380 3980 7zFM.exe 104 PID 3980 wrote to memory of 4696 3980 7zFM.exe 105 PID 3980 wrote to memory of 4696 3980 7zFM.exe 105 PID 3980 wrote to memory of 4696 3980 7zFM.exe 105 PID 3980 wrote to memory of 448 3980 7zFM.exe 106 PID 3980 wrote to memory of 448 3980 7zFM.exe 106 PID 3980 wrote to memory of 448 3980 7zFM.exe 106 PID 2276 wrote to memory of 2096 2276 Unlocker.exe 107 PID 2276 wrote to memory of 2096 2276 Unlocker.exe 107 PID 2276 wrote to memory of 2096 2276 Unlocker.exe 107 PID 2276 wrote to memory of 2096 2276 Unlocker.exe 107 PID 2276 wrote to memory of 2096 2276 Unlocker.exe 107 PID 2276 wrote to memory of 2096 2276 Unlocker.exe 107 PID 2276 wrote to memory of 2096 2276 Unlocker.exe 107 PID 2276 wrote to memory of 2096 2276 Unlocker.exe 107 PID 1380 wrote to memory of 860 1380 Unlocker.exe 109 PID 1380 wrote to memory of 860 1380 Unlocker.exe 109 PID 1380 wrote to memory of 860 1380 Unlocker.exe 109 PID 1380 wrote to memory of 860 1380 Unlocker.exe 109 PID 1380 wrote to memory of 860 1380 Unlocker.exe 109 PID 1380 wrote to memory of 860 1380 Unlocker.exe 109 PID 1380 wrote to memory of 860 1380 Unlocker.exe 109 PID 1380 wrote to memory of 860 1380 Unlocker.exe 109
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\COD BO6 Unlock All Tool (Updated by ASLMANGA).rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\7zOC8FE09D8\Unlocker.exe"C:\Users\Admin\AppData\Local\Temp\7zOC8FE09D8\Unlocker.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC8F30D39\Unlocker.exe"C:\Users\Admin\AppData\Local\Temp\7zOC8F30D39\Unlocker.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:860
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC8FA3C29\Unlocker.exe"C:\Users\Admin\AppData\Local\Temp\7zOC8FA3C29\Unlocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC8F6E309\Unlocker.exe"C:\Users\Admin\AppData\Local\Temp\7zOC8F6E309\Unlocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD59fa984f10a6fe0b8d692e932a8407d15
SHA19cecb394f1b3aa835b25f6b87b7061352327ec1b
SHA256590b47db4ed9f8a998734698caa65414ecf52d2eb98eb17febc462b9274fa0ad
SHA51235f2105019f383a17435e571a86372369c91fa9cbe01a99aa8f1b0ba5ea64c9fd09f14a8fcb3eb346c34dc64933cd430502475b66b400eba4e65b2a8076573f1