Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 19:28
Static task
static1
Behavioral task
behavioral1
Sample
05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe
Resource
win7-20240903-en
General
-
Target
05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe
-
Size
1.8MB
-
MD5
a8db9e4cde35c2e306f1e88e92ee7297
-
SHA1
54e971e3d94a35e46331fd467db5560b3b2e3e1c
-
SHA256
05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3
-
SHA512
48a1cefdf1c2adf36c9dde7182443fe0a156ba685a3c700c5476c905683672b2ec60fa5ec31f43fa6d4a8c5b889abac375eae006d8f89390b28f529ba66db46f
-
SSDEEP
49152:hWeWnymNdrEs0Zl/yWPgDgXo3UzeUHNgpGwsDIYr:4By0rEFZlAYoKWssYr
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2036 05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2036 05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe"C:\Users\Admin\AppData\Local\Temp\05e54feabbbe39d4149b0c344b5578ae5b4310be5e6c2690f8935ece5ac8cbd3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2036