Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 00:04
Static task
static1
Behavioral task
behavioral1
Sample
6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe
Resource
win7-20240903-en
General
-
Target
6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe
-
Size
5.6MB
-
MD5
4e57b0af4aaa2b3bb6025ff4ed410cef
-
SHA1
84f9a13289b7fb27784d60c89d1e45d9f01c4632
-
SHA256
6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff
-
SHA512
d664ab36ba474083516427da370e9d487dd8e04233f219e887940945c3465b262095947c00342afd450069335223e44ce78cb9928e8f587164e9cffe1b022f97
-
SSDEEP
98304:MlsjEYVXcp/iU6dae09scZhCqwgZIJbU7MAITViUiWV92ujKTwoVFFuo/XVBh5g:mcXc9iPOVhwC8Q7MAYsUiWVTj8Jf/XVf
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1520 set thread context of 2688 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 84 PID 1520 set thread context of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 2688 set thread context of 4424 2688 AddInProcess32.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 2688 AddInProcess32.exe 2688 AddInProcess32.exe 2688 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe Token: SeDebugPrivilege 2688 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2688 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 84 PID 1520 wrote to memory of 2688 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 84 PID 1520 wrote to memory of 2688 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 84 PID 1520 wrote to memory of 2688 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 84 PID 1520 wrote to memory of 2688 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 84 PID 1520 wrote to memory of 2688 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 84 PID 1520 wrote to memory of 2688 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 84 PID 1520 wrote to memory of 2688 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 84 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 1520 wrote to memory of 4724 1520 6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe 101 PID 2688 wrote to memory of 4424 2688 AddInProcess32.exe 102 PID 2688 wrote to memory of 4424 2688 AddInProcess32.exe 102 PID 2688 wrote to memory of 4424 2688 AddInProcess32.exe 102 PID 2688 wrote to memory of 4424 2688 AddInProcess32.exe 102 PID 2688 wrote to memory of 4424 2688 AddInProcess32.exe 102 PID 2688 wrote to memory of 4424 2688 AddInProcess32.exe 102 PID 2688 wrote to memory of 4424 2688 AddInProcess32.exe 102 PID 2688 wrote to memory of 4424 2688 AddInProcess32.exe 102 PID 2688 wrote to memory of 4424 2688 AddInProcess32.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe"C:\Users\Admin\AppData\Local\Temp\6a8a1de22320a4f52baf0f7aadd6282dbb754f908986330f2c4f0ed0fb873eff.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4424
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4724
-