Analysis
-
max time kernel
39s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 08:13
Static task
static1
General
-
Target
Reborn (2025).zip
-
Size
21.3MB
-
MD5
450dde0ccb539d2aa5b22fc3af72a7b3
-
SHA1
11a57f9b8a0bdbb5b7ae506dade051ec3ab8c4cb
-
SHA256
1f831d8bf35ec5f5a8312bdf75061e4bfb7d8bdff4a096473db027b55002228a
-
SHA512
9ee4b53bcc3a8f9f12c72950ac1658462be87afb6af9b12fb5284fb6a5c79611b6810ad98ee80b732a572194a14319efcaf1514cc443e5f569273cec8f3807f4
-
SSDEEP
393216:ObBv0SoGMUtNEcqUWeOQi7ItRai6DjPy/LEy+Yaedz1ERL2F3r/ByP:O1FoboEZUWumSRaDjoQy+Yvgi1yP
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 996 Loader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 996 set thread context of 3440 996 Loader.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3412 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3412 7zFM.exe Token: 35 3412 7zFM.exe Token: SeSecurityPrivilege 3412 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3412 7zFM.exe 3412 7zFM.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 996 wrote to memory of 3440 996 Loader.exe 96 PID 996 wrote to memory of 3440 996 Loader.exe 96 PID 996 wrote to memory of 3440 996 Loader.exe 96 PID 996 wrote to memory of 3440 996 Loader.exe 96 PID 996 wrote to memory of 3440 996 Loader.exe 96 PID 996 wrote to memory of 3440 996 Loader.exe 96 PID 996 wrote to memory of 3440 996 Loader.exe 96 PID 996 wrote to memory of 3440 996 Loader.exe 96 PID 996 wrote to memory of 3440 996 Loader.exe 96
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Reborn (2025).zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3412
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4140
-
C:\Users\Admin\Desktop\Reborn\Loader.exe"C:\Users\Admin\Desktop\Reborn\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD572d7c55385c2184f0911d7bc4e6e06d9
SHA16371e379c0f1a3cb6aa43f2dff28320ccf01d54a
SHA256adfdf948a863b8bfcda9e6551202fd3b65120ebbe8171d56a0256c52f0fe4057
SHA512a810b680d3794b8330b8a29132601601a3ba94ff6eb7efeb2634edfb7b015c935eccb3a0bba075df01564da8e8079add3a94eac7f6ccea5e97c9d014e0f6ed49