Analysis
-
max time kernel
240s -
max time network
242s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 02:06
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 10 IoCs
pid Process 2580 LightSpoofer.exe 3780 LightSpoofer.exe 4568 LightSpoofer.exe 1564 LightSpoofer.exe 180 LightSpoofer.exe 3748 LightSpoofer.exe 1904 LightSpoofer.exe 2240 LightSpoofer.exe 4084 LightSpoofer.exe 1736 LightSpoofer.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 2580 set thread context of 2288 2580 LightSpoofer.exe 129 PID 3780 set thread context of 4592 3780 LightSpoofer.exe 133 PID 4568 set thread context of 636 4568 LightSpoofer.exe 144 PID 1564 set thread context of 448 1564 LightSpoofer.exe 150 PID 180 set thread context of 4892 180 LightSpoofer.exe 154 PID 3748 set thread context of 4024 3748 LightSpoofer.exe 158 PID 1904 set thread context of 3516 1904 LightSpoofer.exe 162 PID 2240 set thread context of 5020 2240 LightSpoofer.exe 166 PID 4084 set thread context of 3708 4084 LightSpoofer.exe 170 PID 1736 set thread context of 3748 1736 LightSpoofer.exe 175 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language batbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GetInput.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LightSpoofer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 2944 msedge.exe 2944 msedge.exe 852 identity_helper.exe 852 identity_helper.exe 2008 msedge.exe 2008 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1444 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe 1444 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3684 2944 msedge.exe 83 PID 2944 wrote to memory of 3684 2944 msedge.exe 83 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4912 2944 msedge.exe 84 PID 2944 wrote to memory of 4976 2944 msedge.exe 85 PID 2944 wrote to memory of 4976 2944 msedge.exe 85 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86 PID 2944 wrote to memory of 4804 2944 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/reah1jsn/L1GHTSP0OFER/archive/refs/heads/main.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc704b46f8,0x7ffc704b4708,0x7ffc704b47182⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5720 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1923309083405398330,21677739572341382,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:460
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4252
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4592
-
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\GetInput.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\GetInput.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4024
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\batbox.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\batbox.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3176
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\batbox.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\batbox.exe"1⤵PID:2136
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:636
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\README.md2⤵PID:464
-
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4892
-
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4024
-
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"C:\Users\Admin\Downloads\L1GHTSP0OFER-main\L1GHTSP0OFER-main\LightSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\57313352-04cc-404e-b44e-a9788a881bc0.tmp
Filesize6KB
MD5a931bd7cb4927827e828aa6d8016c856
SHA10409efa62c997f627861bd85b4d9dd0d274e483d
SHA25614d00ecd5c701ef7ca0542b91ff360327d5706e0304ef4af7fbad065d6570966
SHA512e8f571513518b3fb7320e6093fd36561b009b25b484577cb076af7ed38090c75fe87fb2cc071dffe4ab487923b5a07857cc69f45d8c993a86869b08ab04e6548
-
Filesize
255B
MD5d11edf9e08a127c768843acea41d0bc5
SHA1ff1af9b39de4a3f547407fd9864ffdd2bb6c7354
SHA256217e4d9d1412e45abf7a653f72a5ab8b53bc8fc6f377f52a042668a41abc7478
SHA51292c3f0def567b0e2f2523ed25eb9d4abff06070b8be744fea4a6678f25f292439d7bc0c8015eaa6281b7f43149eebb3d3821cd6d6436598481113694b11ddea3
-
Filesize
6KB
MD50ed61b4da002f99759b7b6be73df8300
SHA1d766d85daf714ce12a718a1f56e3f3925253ae8d
SHA256865ed9bbeca5d86324529aac302111ae3faa62b5d5d39cee2dd38bf45eb4af42
SHA512a5653eadf3b36f67b7f448b320991e9b5ec5cbc3da0bd1ca6804be76825c2930886b463e3273d38e135d6a2e056dc156f11ae1ee85bd0c9034de6c8d25087819
-
Filesize
5KB
MD5d77b8b79f65efbf74975f794d78f8692
SHA1d4e97c928b84af8694954c43e7a5c43073d1bb13
SHA2561e2b60371b403b4cadfe4d86673bab98feb80f8ed82a0450150adba93879f4e6
SHA512799ca3395c60b034790b975c762ced0e2fc8698558a13f43fbb13ee34ab0b8a0803f337311b4cf8649f97041c0648e070b59b544b3fbb6d74d6d29bd93149281
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5901d1513f6747373b5efe730ca91a43e
SHA19925b7c072b2bf6c3cece1aa74cb3889aac2d43a
SHA256da4a6429e65b9fa21e21e109256ee92b517e52b338c85c9d91d0b26f169828fa
SHA5122eae573cb0debe8c5eedc13cf65509fe3772f8400e4a23bf3d5c2c6d9bbda705dbaa93a818347f0d6f9a2e276a02d80dc860fed6f14725d5b4e162e2528c99aa
-
Filesize
10KB
MD5b552885eb0ee2b7c3d2b1fc6b0fa6485
SHA18c882c562dd8c90be0e77b09fc8bd06da15558fe
SHA2562b6dc761a67991a5021186be9fbaf98d1ab8c20f5cc3f1ded4b5d866d62dcd74
SHA512c641825b21033b82d59e3c1f4d266b89b4baec870f331722b7661df6ca0f36fcd42d1ce3e98c5896352a8b70c649a163a673e78a67540c479aa20323b5a36c83
-
Filesize
10KB
MD5de1a805d2c7f5d1c6148b31d1baafcac
SHA13ff3c34f1089899e06a9d6fadd14f3c4ba509dc2
SHA2569ed456d1f04530755c9531525ba9c3b34ec633eb736a9325747dbc48f1b03cdb
SHA512a98244255783223dd358301bdc088d1dc0d7ec0a8e92f6c6238eb30fbf76dc0f3f472b63e5be01fbff04b7f7c5af03b751f22c13be31bddcea499d2baa7caeea
-
Filesize
428KB
MD536c0b5018242a87d99e2b5000dfc29ad
SHA1d46f1ba661e3d18c8b1e7895920368e9bddbc7ae
SHA25694cc3d303105493943c6cce20473c82eff3942515bfd73df976e802d97be78b4
SHA5128f10af3f519e2c52539fb79ec16cd82470f25c0863b622030ed4bd59f437c9109caf46d151c18889c4939a44672339d75029c8f757cf7118e759b90355317f0a
-
Filesize
779KB
MD53eadbefe0c1d6afacf633ea984b84e62
SHA10144ddd4b475c3c9b7ae8a7c9893c2b5380f3be6
SHA2564a7b68785058f0cbdebe19e0136e04523ff244f203985c15d0630c7542c09ee5
SHA512617c611bb23c5bc0d8d3bb9e07345c796a3ad28db4f849d4e07de6dbfa5fa9ab6dd621abd8bedc448807c247539a1b896c5196b6fe4c5df0cd78402f26d6f845