Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 09:58
Static task
static1
Behavioral task
behavioral1
Sample
ChatGPT-5Version2024.exe
Resource
win7-20241010-en
General
-
Target
ChatGPT-5Version2024.exe
-
Size
599KB
-
MD5
906e2e800689b68629d194ba1d388a5d
-
SHA1
e1a7213c1b565dd4fbf5c73846f7e515c62eabc1
-
SHA256
9fcba37dbe53ff8a8e1600f25c7493524dc1c4beb6f2d7f116d0db5fcd4fe40e
-
SHA512
fc861c25649262eb28bb084705ce5ffaea57be4b2f071627e277583aedd5ae494ce1a5efcac78a8255c079abd515d6e8144559e9145d993f3224466ed867eabf
-
SSDEEP
12288:KRlgp3NPQ1eiEY+Iy7XMrHyDO5TwAjVw+zvIiR679iN5g49d:KRGLaeFkg8HfXw+zvjRk965gQd
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.exe TDKNK95ivc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.exe TDKNK95ivc.exe -
Executes dropped EXE 7 IoCs
pid Process 2856 TDKNK95ivc.exe 2704 QHCyya9ntc.exe 2864 QHCyya9ntc.exe 2764 QHCyya9ntc.exe 3064 QHCyya9ntc.exe 2768 QHCyya9ntc.exe 332 QHCyya9ntc.exe -
Loads dropped DLL 10 IoCs
pid Process 2820 ChatGPT-5Version2024.exe 2820 ChatGPT-5Version2024.exe 2704 QHCyya9ntc.exe 2704 QHCyya9ntc.exe 2704 QHCyya9ntc.exe 2704 QHCyya9ntc.exe 2704 QHCyya9ntc.exe 584 WerFault.exe 584 WerFault.exe 584 WerFault.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2256 set thread context of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2704 set thread context of 332 2704 QHCyya9ntc.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2276 2256 WerFault.exe 29 584 2704 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChatGPT-5Version2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChatGPT-5Version2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QHCyya9ntc.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2820 2256 ChatGPT-5Version2024.exe 31 PID 2256 wrote to memory of 2276 2256 ChatGPT-5Version2024.exe 32 PID 2256 wrote to memory of 2276 2256 ChatGPT-5Version2024.exe 32 PID 2256 wrote to memory of 2276 2256 ChatGPT-5Version2024.exe 32 PID 2256 wrote to memory of 2276 2256 ChatGPT-5Version2024.exe 32 PID 2820 wrote to memory of 2856 2820 ChatGPT-5Version2024.exe 33 PID 2820 wrote to memory of 2856 2820 ChatGPT-5Version2024.exe 33 PID 2820 wrote to memory of 2856 2820 ChatGPT-5Version2024.exe 33 PID 2820 wrote to memory of 2856 2820 ChatGPT-5Version2024.exe 33 PID 2820 wrote to memory of 2704 2820 ChatGPT-5Version2024.exe 34 PID 2820 wrote to memory of 2704 2820 ChatGPT-5Version2024.exe 34 PID 2820 wrote to memory of 2704 2820 ChatGPT-5Version2024.exe 34 PID 2820 wrote to memory of 2704 2820 ChatGPT-5Version2024.exe 34 PID 2704 wrote to memory of 2864 2704 QHCyya9ntc.exe 36 PID 2704 wrote to memory of 2864 2704 QHCyya9ntc.exe 36 PID 2704 wrote to memory of 2864 2704 QHCyya9ntc.exe 36 PID 2704 wrote to memory of 2864 2704 QHCyya9ntc.exe 36 PID 2704 wrote to memory of 2764 2704 QHCyya9ntc.exe 37 PID 2704 wrote to memory of 2764 2704 QHCyya9ntc.exe 37 PID 2704 wrote to memory of 2764 2704 QHCyya9ntc.exe 37 PID 2704 wrote to memory of 2764 2704 QHCyya9ntc.exe 37 PID 2704 wrote to memory of 3064 2704 QHCyya9ntc.exe 38 PID 2704 wrote to memory of 3064 2704 QHCyya9ntc.exe 38 PID 2704 wrote to memory of 3064 2704 QHCyya9ntc.exe 38 PID 2704 wrote to memory of 3064 2704 QHCyya9ntc.exe 38 PID 2704 wrote to memory of 2768 2704 QHCyya9ntc.exe 39 PID 2704 wrote to memory of 2768 2704 QHCyya9ntc.exe 39 PID 2704 wrote to memory of 2768 2704 QHCyya9ntc.exe 39 PID 2704 wrote to memory of 2768 2704 QHCyya9ntc.exe 39 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 332 2704 QHCyya9ntc.exe 40 PID 2704 wrote to memory of 584 2704 QHCyya9ntc.exe 41 PID 2704 wrote to memory of 584 2704 QHCyya9ntc.exe 41 PID 2704 wrote to memory of 584 2704 QHCyya9ntc.exe 41 PID 2704 wrote to memory of 584 2704 QHCyya9ntc.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChatGPT-5Version2024.exe"C:\Users\Admin\AppData\Local\Temp\ChatGPT-5Version2024.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\ChatGPT-5Version2024.exe"C:\Users\Admin\AppData\Local\Temp\ChatGPT-5Version2024.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Roaming\TDKNK95ivc.exe"C:\Users\Admin\AppData\Roaming\TDKNK95ivc.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2856
-
-
C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"4⤵
- Executes dropped EXE
PID:2864
-
-
C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"4⤵
- Executes dropped EXE
PID:2764
-
-
C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"4⤵
- Executes dropped EXE
PID:3064
-
-
C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"4⤵
- Executes dropped EXE
PID:2768
-
-
C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"C:\Users\Admin\AppData\Roaming\QHCyya9ntc.exe"4⤵
- Executes dropped EXE
PID:332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 5324⤵
- Loads dropped DLL
- Program crash
PID:584
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 682⤵
- Program crash
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD58b9abdd34bc37aa98a7354ddfadb3ad4
SHA1e0d0f196cd32d11c0730782312ee6187bc0a4e25
SHA256998e60e73f4fdc01ac1c16038b0c6ee393adeb95394cad764d77bc2d8d661d6f
SHA51271340bddced0006d82731924f2fe1d605655aeae63058295b86e98698db60611370fd0d8f87411b5cd26c2a080af91752cff5b71fd87039e676bea095c21f309
-
Filesize
11KB
MD55afb8ce4dd3923219bd69bd7b5168d91
SHA1e06283294510284af9082eb67d368e6d88d9e232
SHA256f727bba8d917fa3f129d71745e0741a8511f940b1a6817ff5130aa2f3ae85c79
SHA5128135efb34c768a9c292b54bc25845dd9b388e98f9f0b67918fbf5887c8e1d3da81bb84e044eebdf0868c40a685bd157daafb4789b373dea3e273c5275ebd0740