Overview
overview
10Static
static
3Crypto See...on.exe
windows7-x64
10Crypto See...on.exe
windows10-2004-x64
10NL7Data0404.dll
windows7-x64
1NL7Data0404.dll
windows10-2004-x64
1dmview.dll
windows7-x64
7dmview.dll
windows10-2004-x64
1dnscmmc.dll
windows7-x64
1dnscmmc.dll
windows10-2004-x64
1elshyph.dll
windows7-x64
1elshyph.dll
windows10-2004-x64
1filemgmt.dll
windows7-x64
1filemgmt.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 00:27
Static task
static1
Behavioral task
behavioral1
Sample
Crypto Seed Checker 2024 version.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Crypto Seed Checker 2024 version.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NL7Data0404.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
NL7Data0404.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
dmview.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
dmview.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
dnscmmc.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
dnscmmc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
elshyph.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
elshyph.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
filemgmt.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
filemgmt.dll
Resource
win10v2004-20241007-en
General
-
Target
Crypto Seed Checker 2024 version.exe
-
Size
646KB
-
MD5
07feca81b29907ce6550288a7d2b8821
-
SHA1
6252d362fe96293254a1f284a95355440a2dc2cc
-
SHA256
eb28c83590f742bb8a12d01f4692421786b6a04dcf9fcc31df93de6d0068b717
-
SHA512
add0f86c572a83d4d2baa8a3d79db1ce321ae846aa02afe559abc91da0bd8ca6bd3969f4e75372ea606057436fc5e3353c71d23feef843340c41be9d0b72d800
-
SSDEEP
12288:J4CD99jUhaQS/Aby46x4YFFR5WQ/Ee4vbDAt8G+DiBezmm72kiz5iIrSEO:Osbkaqx6xDR5BEe4X2jnBeKPIt
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.exe JvUlTLOksc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.exe JvUlTLOksc.exe -
Executes dropped EXE 4 IoCs
pid Process 2140 JvUlTLOksc.exe 2764 NICK8cm5L0.exe 1556 NICK8cm5L0.exe 276 NICK8cm5L0.exe -
Loads dropped DLL 9 IoCs
pid Process 2568 Crypto Seed Checker 2024 version.exe 2568 Crypto Seed Checker 2024 version.exe 2764 NICK8cm5L0.exe 2764 NICK8cm5L0.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1672 set thread context of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 2764 set thread context of 1556 2764 NICK8cm5L0.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2580 1672 WerFault.exe 30 2624 2764 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypto Seed Checker 2024 version.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypto Seed Checker 2024 version.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NICK8cm5L0.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2364 1672 Crypto Seed Checker 2024 version.exe 32 PID 1672 wrote to memory of 2364 1672 Crypto Seed Checker 2024 version.exe 32 PID 1672 wrote to memory of 2364 1672 Crypto Seed Checker 2024 version.exe 32 PID 1672 wrote to memory of 2364 1672 Crypto Seed Checker 2024 version.exe 32 PID 1672 wrote to memory of 2092 1672 Crypto Seed Checker 2024 version.exe 33 PID 1672 wrote to memory of 2092 1672 Crypto Seed Checker 2024 version.exe 33 PID 1672 wrote to memory of 2092 1672 Crypto Seed Checker 2024 version.exe 33 PID 1672 wrote to memory of 2092 1672 Crypto Seed Checker 2024 version.exe 33 PID 1672 wrote to memory of 2360 1672 Crypto Seed Checker 2024 version.exe 34 PID 1672 wrote to memory of 2360 1672 Crypto Seed Checker 2024 version.exe 34 PID 1672 wrote to memory of 2360 1672 Crypto Seed Checker 2024 version.exe 34 PID 1672 wrote to memory of 2360 1672 Crypto Seed Checker 2024 version.exe 34 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2568 1672 Crypto Seed Checker 2024 version.exe 35 PID 1672 wrote to memory of 2580 1672 Crypto Seed Checker 2024 version.exe 36 PID 1672 wrote to memory of 2580 1672 Crypto Seed Checker 2024 version.exe 36 PID 1672 wrote to memory of 2580 1672 Crypto Seed Checker 2024 version.exe 36 PID 1672 wrote to memory of 2580 1672 Crypto Seed Checker 2024 version.exe 36 PID 2568 wrote to memory of 2140 2568 Crypto Seed Checker 2024 version.exe 37 PID 2568 wrote to memory of 2140 2568 Crypto Seed Checker 2024 version.exe 37 PID 2568 wrote to memory of 2140 2568 Crypto Seed Checker 2024 version.exe 37 PID 2568 wrote to memory of 2140 2568 Crypto Seed Checker 2024 version.exe 37 PID 2568 wrote to memory of 2764 2568 Crypto Seed Checker 2024 version.exe 38 PID 2568 wrote to memory of 2764 2568 Crypto Seed Checker 2024 version.exe 38 PID 2568 wrote to memory of 2764 2568 Crypto Seed Checker 2024 version.exe 38 PID 2568 wrote to memory of 2764 2568 Crypto Seed Checker 2024 version.exe 38 PID 2764 wrote to memory of 276 2764 NICK8cm5L0.exe 40 PID 2764 wrote to memory of 276 2764 NICK8cm5L0.exe 40 PID 2764 wrote to memory of 276 2764 NICK8cm5L0.exe 40 PID 2764 wrote to memory of 276 2764 NICK8cm5L0.exe 40 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 1556 2764 NICK8cm5L0.exe 41 PID 2764 wrote to memory of 2624 2764 NICK8cm5L0.exe 42 PID 2764 wrote to memory of 2624 2764 NICK8cm5L0.exe 42 PID 2764 wrote to memory of 2624 2764 NICK8cm5L0.exe 42 PID 2764 wrote to memory of 2624 2764 NICK8cm5L0.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"2⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"2⤵PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"2⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"C:\Users\Admin\AppData\Local\Temp\Crypto Seed Checker 2024 version.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\JvUlTLOksc.exe"C:\Users\Admin\AppData\Roaming\JvUlTLOksc.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2140
-
-
C:\Users\Admin\AppData\Roaming\NICK8cm5L0.exe"C:\Users\Admin\AppData\Roaming\NICK8cm5L0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\NICK8cm5L0.exe"C:\Users\Admin\AppData\Roaming\NICK8cm5L0.exe"4⤵
- Executes dropped EXE
PID:276
-
-
C:\Users\Admin\AppData\Roaming\NICK8cm5L0.exe"C:\Users\Admin\AppData\Roaming\NICK8cm5L0.exe"4⤵
- Executes dropped EXE
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 5124⤵
- Loads dropped DLL
- Program crash
PID:2624
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 5282⤵
- Program crash
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD55afb8ce4dd3923219bd69bd7b5168d91
SHA1e06283294510284af9082eb67d368e6d88d9e232
SHA256f727bba8d917fa3f129d71745e0741a8511f940b1a6817ff5130aa2f3ae85c79
SHA5128135efb34c768a9c292b54bc25845dd9b388e98f9f0b67918fbf5887c8e1d3da81bb84e044eebdf0868c40a685bd157daafb4789b373dea3e273c5275ebd0740
-
Filesize
381KB
MD5a609440ff44e49322c92cbc9b081b665
SHA1bfe2f35ea18a797b4048c4f6b8b2435a8801c225
SHA2569e5e374fc7bd6937b1e35249b7c70cdefdb44e1aae7d9bb35c3bb67c1ef864dd
SHA512a0c283daa88dd39a92031f5bba68523563a647f7a5f7e8dacfcdbe74ee2e41db9e304284e5fdd6e1ac7a8c8767febd0c193224b41c86af9b2d62e2759c036b6b