Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 01:52
Behavioral task
behavioral1
Sample
d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe
Resource
win7-20241010-en
General
-
Target
d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe
-
Size
482KB
-
MD5
f23b6bce35ed7e7fd538a426defd13b8
-
SHA1
242506b0ef3ece7276a10ecafa756c72c28b3366
-
SHA256
d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb
-
SHA512
3a45f9b785715df816686731968c295748f488896a93e9c1e2a7d26cf4b33e778735edc74821dd5d13ed6aa9b222f59c66cf72a2e79e6370cf44010e41396c1e
-
SSDEEP
12288:Hmx08SHGoAYBTQB5zr1KcpiFCALt7PYNZPPs:QR+GoAYB25n1v2C
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4996 set thread context of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84 PID 4996 wrote to memory of 3784 4996 d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe"C:\Users\Admin\AppData\Local\Temp\d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD59a662a61f1ef199ccafd4363b4964b2d
SHA14fe678ec35b5efaa9481cb3dc69a66390dada7c2
SHA256d4459904722d68bcae78b2c5dbca9621cf547a155245ece1ea6a23d5913eacb7
SHA512085a4203b691bb62a3ea4049fe6c8ccc59e213eb4a3be8a04501a81b504f9c3a7b32eeef9ce28dde6317a1c3981c812f229cb3e15893b953769f3b251b48dc24