Analysis
-
max time kernel
78s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2025, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
Cod Bo6 Unlock All (by Anime lkigai).rar
Resource
win7-20241010-en
General
-
Target
Cod Bo6 Unlock All (by Anime lkigai).rar
-
Size
62.5MB
-
MD5
ac99b172840d552e1e1f5fde544bd3bd
-
SHA1
326b2ad1e21fa8461d5bc1ee6834465e84d7cdeb
-
SHA256
b68d3c409871a9e68208a99c52b5d7d23ee6b0f51a7717fa06e49e579d73c100
-
SHA512
e14cea62de336e89580a7ce898c52f07bd80ab98b7ac6f6638303941d3c75d5c2419b5d94ada0863d9c0d52f8602e70284705b092829ab6c2da43657631550d4
-
SSDEEP
1572864:z0letFJ6kWphu+Dgng9YyMP61nm4rCoUh+3l06tecIn6P:hFXWG+/YyMQlCoUB64XW
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 804 Unlocker.exe 4256 Unlocker.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 804 set thread context of 2948 804 Unlocker.exe 104 PID 4256 set thread context of 4088 4256 Unlocker.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlocker.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2156 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 2156 7zFM.exe Token: 35 2156 7zFM.exe Token: SeSecurityPrivilege 2156 7zFM.exe Token: SeSecurityPrivilege 2156 7zFM.exe Token: SeSecurityPrivilege 2156 7zFM.exe Token: SeSecurityPrivilege 2156 7zFM.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe 2156 7zFM.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2156 wrote to memory of 804 2156 7zFM.exe 99 PID 2156 wrote to memory of 804 2156 7zFM.exe 99 PID 2156 wrote to memory of 804 2156 7zFM.exe 99 PID 2156 wrote to memory of 4256 2156 7zFM.exe 103 PID 2156 wrote to memory of 4256 2156 7zFM.exe 103 PID 2156 wrote to memory of 4256 2156 7zFM.exe 103 PID 804 wrote to memory of 2948 804 Unlocker.exe 104 PID 804 wrote to memory of 2948 804 Unlocker.exe 104 PID 804 wrote to memory of 2948 804 Unlocker.exe 104 PID 804 wrote to memory of 2948 804 Unlocker.exe 104 PID 804 wrote to memory of 2948 804 Unlocker.exe 104 PID 804 wrote to memory of 2948 804 Unlocker.exe 104 PID 804 wrote to memory of 2948 804 Unlocker.exe 104 PID 804 wrote to memory of 2948 804 Unlocker.exe 104 PID 804 wrote to memory of 2948 804 Unlocker.exe 104 PID 4256 wrote to memory of 4088 4256 Unlocker.exe 106 PID 4256 wrote to memory of 4088 4256 Unlocker.exe 106 PID 4256 wrote to memory of 4088 4256 Unlocker.exe 106 PID 4256 wrote to memory of 4088 4256 Unlocker.exe 106 PID 4256 wrote to memory of 4088 4256 Unlocker.exe 106 PID 4256 wrote to memory of 4088 4256 Unlocker.exe 106 PID 4256 wrote to memory of 4088 4256 Unlocker.exe 106 PID 4256 wrote to memory of 4088 4256 Unlocker.exe 106 PID 4256 wrote to memory of 4088 4256 Unlocker.exe 106
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Cod Bo6 Unlock All (by Anime lkigai).rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\7zOC6817E78\Unlocker.exe"C:\Users\Admin\AppData\Local\Temp\7zOC6817E78\Unlocker.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC6830FA8\Unlocker.exe"C:\Users\Admin\AppData\Local\Temp\7zOC6830FA8\Unlocker.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD5ed721b1b65deed8892433cbd15f1d0b9
SHA18f2ce6ef490912cffcda6b4d1f85d20e59431ea7
SHA256e20b5a2f6ffc11f7f98c13e4a8572815172d6159a65e0d6eaec0a328dbba4665
SHA512451c9ee9dab86822320a0a717b487b56ebd10e287ebf3f865dc8efa068c0249ebe563822438bdaf08bbe058b78d703f256043129e656ef7e379ab4573178b922