Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 12:19
Behavioral task
behavioral1
Sample
socolo.exe
Resource
win7-20241010-en
General
-
Target
socolo.exe
-
Size
513KB
-
MD5
ab75f8c5cf9da64ae4f02f04a4b35119
-
SHA1
34530281efd06c313e9dbfd9bf2200fa1946d8e8
-
SHA256
7cf668f7389f9858597fb7ceae3333c94043893f1fc61cb581ebb5f9721e493a
-
SHA512
ba476b3c81f4a981e7cf94cefb95ef2080ff655a6ab702cb593f59348809e1cfe151d80e3d6ed5709c93a18f065ef73152a52fc08540383f4a1dbdf172f930a2
-
SSDEEP
12288:fjPkKh6c5bCYaF824EMQ+hCZIqfBACYc:bkKh5OYceEMQ+h0
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://begguinnerz.biz/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 1520 socolo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 3320 1520 socolo.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language socolo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83 PID 1520 wrote to memory of 3320 1520 socolo.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\socolo.exe"C:\Users\Admin\AppData\Local\Temp\socolo.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD57eebef384d5eb0d9e64f720022cb4ba4
SHA19931688621c10c61085494ac028ff5e79e602db1
SHA256c6f16b8bb004f4562ae41b096086dfee9c5cdb15c5bf90934a8f0e7a33e742cb
SHA512c528414031865887c200d3b7a6b401a538dc913882ef6ee845d62fe9cd5e3cd80bdea797a54f53e4281c3bd0eeec198f0a1883ccd9b27b794faeedbeb9f22e8b