Analysis
-
max time kernel
74s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 16:30
Static task
static1
Behavioral task
behavioral1
Sample
script.zip
Resource
win7-20241010-en
General
-
Target
script.zip
-
Size
5.5MB
-
MD5
d23f680812d614afae51436e43a7acbe
-
SHA1
4906667187e56bc7242ba7540efc01e621e1399b
-
SHA256
86ef1d24279e7eea5ecfefb4d8e605c78916e3d504ba4bb6dd86063159e50389
-
SHA512
91148c0abac076a385b5afbb9e2e4927b0c1ad50d483ba84aca0cae8b0c4a16f5b17b75879a47afed893e9c1a3426f7138b1ac7ec7ec2f3908be224b76487626
-
SSDEEP
98304:3u4FqHR5+l1tcINUfnffSDs4qgVpJb9139yDbcuvh7E5fZ4t93HNWTF9wmbJ8XgA:ei85s1tcICfiDs4ptcpyfCjt8F3bJ8XT
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 8 IoCs
pid Process 3008 Script.exe 3556 Script.exe 1660 Script.exe 4700 Script.exe 936 Script.exe 2816 Script.exe 4436 Script.exe 4008 Script.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3008 set thread context of 3556 3008 Script.exe 108 PID 1660 set thread context of 4700 1660 Script.exe 115 PID 936 set thread context of 2816 936 Script.exe 121 PID 4436 set thread context of 4008 4436 Script.exe 128 -
Program crash 4 IoCs
pid pid_target Process procid_target 4896 3008 WerFault.exe 104 4812 1660 WerFault.exe 113 4864 936 WerFault.exe 119 1360 4436 WerFault.exe 126 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Script.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2496 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3088 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3088 7zFM.exe Token: 35 3088 7zFM.exe Token: SeSecurityPrivilege 3088 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3088 7zFM.exe 3088 7zFM.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3556 3008 Script.exe 108 PID 3008 wrote to memory of 3556 3008 Script.exe 108 PID 3008 wrote to memory of 3556 3008 Script.exe 108 PID 3008 wrote to memory of 3556 3008 Script.exe 108 PID 3008 wrote to memory of 3556 3008 Script.exe 108 PID 3008 wrote to memory of 3556 3008 Script.exe 108 PID 3008 wrote to memory of 3556 3008 Script.exe 108 PID 3008 wrote to memory of 3556 3008 Script.exe 108 PID 3008 wrote to memory of 3556 3008 Script.exe 108 PID 1660 wrote to memory of 4700 1660 Script.exe 115 PID 1660 wrote to memory of 4700 1660 Script.exe 115 PID 1660 wrote to memory of 4700 1660 Script.exe 115 PID 1660 wrote to memory of 4700 1660 Script.exe 115 PID 1660 wrote to memory of 4700 1660 Script.exe 115 PID 1660 wrote to memory of 4700 1660 Script.exe 115 PID 1660 wrote to memory of 4700 1660 Script.exe 115 PID 1660 wrote to memory of 4700 1660 Script.exe 115 PID 1660 wrote to memory of 4700 1660 Script.exe 115 PID 936 wrote to memory of 2816 936 Script.exe 121 PID 936 wrote to memory of 2816 936 Script.exe 121 PID 936 wrote to memory of 2816 936 Script.exe 121 PID 936 wrote to memory of 2816 936 Script.exe 121 PID 936 wrote to memory of 2816 936 Script.exe 121 PID 936 wrote to memory of 2816 936 Script.exe 121 PID 936 wrote to memory of 2816 936 Script.exe 121 PID 936 wrote to memory of 2816 936 Script.exe 121 PID 936 wrote to memory of 2816 936 Script.exe 121 PID 4436 wrote to memory of 4008 4436 Script.exe 128 PID 4436 wrote to memory of 4008 4436 Script.exe 128 PID 4436 wrote to memory of 4008 4436 Script.exe 128 PID 4436 wrote to memory of 4008 4436 Script.exe 128 PID 4436 wrote to memory of 4008 4436 Script.exe 128 PID 4436 wrote to memory of 4008 4436 Script.exe 128 PID 4436 wrote to memory of 4008 4436 Script.exe 128 PID 4436 wrote to memory of 4008 4436 Script.exe 128 PID 4436 wrote to memory of 4008 4436 Script.exe 128
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\script.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5028
-
C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 7922⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3008 -ip 30081⤵PID:640
-
C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 7642⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1660 -ip 16601⤵PID:3224
-
C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 7642⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 936 -ip 9361⤵PID:2900
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\fdgfdgfdgfdf\asset.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2496
-
C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"C:\Users\Admin\Desktop\fdgfdgfdgfdf\Script.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 7722⤵
- Program crash
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4436 -ip 44361⤵PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
353KB
MD5cee34695a042e5bafcfcb1d44a63bb3e
SHA14afb4ef91376150e3b5dca306b0327e1adc17a9c
SHA256298aabe253921a8444fb6725dedea3525c9ae7e7b9f995e5cc72edc9ddcc01e7
SHA51244f99b88fecfbb5c16ea03f6668c56adf060e774bbec2bab6b038b1d13187dece6be8ab98e51228f77fcef4c20977aae2da6640b9fa6f83708d48a5cd869c72b
-
Filesize
298KB
MD500ba06448d5e03dfbfa60a4bc2219193
SHA1a5064f36a48ef1914c62879098bf9d49a58314c5
SHA256884f1552fe526d72f01035f8fd1b565d254b52fbbfcb6cb034f34598794f7d7d
SHA512c5faca4c81c1aa1ef4b8cf6fdaf5900f4eb6457b9117097a045f875a758d04e39f1697724fecee4d7895f1efd6dc9633a1b276c3fa5453a00a424610753d626c