Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 10:40
Static task
static1
Behavioral task
behavioral1
Sample
HouseholdsClicking.exe
Resource
win7-20240903-en
General
-
Target
HouseholdsClicking.exe
-
Size
1.0MB
-
MD5
c3c0fbe6393929c60e63885bab2603f6
-
SHA1
09c0cb9efeaa8808710df3f47b3c56fcd323b8bd
-
SHA256
2fbecbe7ba6ce56cfe6b6da8e7aaf6127755161a7ef340b7b20c2b061404f022
-
SHA512
6d288c7fe70a1a5fc95347a86dff1ce7fed819e994e56be482383273f58d41ccafe2dfeb9b98d9d4250d58b02545cdc856a642549e1f5ef74b48110af701a37e
-
SSDEEP
24576:tOwnvrCKVzzbzfafzs68PmgUFDWrE1X7BH/:jnTrJnEsNUFyM7Bf
Malware Config
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://ingreem-eilish.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 1476 Appliance.com -
Loads dropped DLL 1 IoCs
pid Process 2876 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2084 tasklist.exe 2544 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\ArHuntington HouseholdsClicking.exe File opened for modification C:\Windows\ProductiveRacing HouseholdsClicking.exe File opened for modification C:\Windows\BbsStolen HouseholdsClicking.exe File opened for modification C:\Windows\ScoreAtom HouseholdsClicking.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Appliance.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HouseholdsClicking.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1476 Appliance.com 1476 Appliance.com 1476 Appliance.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2544 tasklist.exe Token: SeDebugPrivilege 2084 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1476 Appliance.com 1476 Appliance.com 1476 Appliance.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1476 Appliance.com 1476 Appliance.com 1476 Appliance.com -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2876 2140 HouseholdsClicking.exe 31 PID 2140 wrote to memory of 2876 2140 HouseholdsClicking.exe 31 PID 2140 wrote to memory of 2876 2140 HouseholdsClicking.exe 31 PID 2140 wrote to memory of 2876 2140 HouseholdsClicking.exe 31 PID 2876 wrote to memory of 2544 2876 cmd.exe 33 PID 2876 wrote to memory of 2544 2876 cmd.exe 33 PID 2876 wrote to memory of 2544 2876 cmd.exe 33 PID 2876 wrote to memory of 2544 2876 cmd.exe 33 PID 2876 wrote to memory of 480 2876 cmd.exe 34 PID 2876 wrote to memory of 480 2876 cmd.exe 34 PID 2876 wrote to memory of 480 2876 cmd.exe 34 PID 2876 wrote to memory of 480 2876 cmd.exe 34 PID 2876 wrote to memory of 2084 2876 cmd.exe 36 PID 2876 wrote to memory of 2084 2876 cmd.exe 36 PID 2876 wrote to memory of 2084 2876 cmd.exe 36 PID 2876 wrote to memory of 2084 2876 cmd.exe 36 PID 2876 wrote to memory of 2560 2876 cmd.exe 37 PID 2876 wrote to memory of 2560 2876 cmd.exe 37 PID 2876 wrote to memory of 2560 2876 cmd.exe 37 PID 2876 wrote to memory of 2560 2876 cmd.exe 37 PID 2876 wrote to memory of 2184 2876 cmd.exe 38 PID 2876 wrote to memory of 2184 2876 cmd.exe 38 PID 2876 wrote to memory of 2184 2876 cmd.exe 38 PID 2876 wrote to memory of 2184 2876 cmd.exe 38 PID 2876 wrote to memory of 1844 2876 cmd.exe 39 PID 2876 wrote to memory of 1844 2876 cmd.exe 39 PID 2876 wrote to memory of 1844 2876 cmd.exe 39 PID 2876 wrote to memory of 1844 2876 cmd.exe 39 PID 2876 wrote to memory of 2396 2876 cmd.exe 40 PID 2876 wrote to memory of 2396 2876 cmd.exe 40 PID 2876 wrote to memory of 2396 2876 cmd.exe 40 PID 2876 wrote to memory of 2396 2876 cmd.exe 40 PID 2876 wrote to memory of 1476 2876 cmd.exe 41 PID 2876 wrote to memory of 1476 2876 cmd.exe 41 PID 2876 wrote to memory of 1476 2876 cmd.exe 41 PID 2876 wrote to memory of 1476 2876 cmd.exe 41 PID 2876 wrote to memory of 572 2876 cmd.exe 42 PID 2876 wrote to memory of 572 2876 cmd.exe 42 PID 2876 wrote to memory of 572 2876 cmd.exe 42 PID 2876 wrote to memory of 572 2876 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\HouseholdsClicking.exe"C:\Users\Admin\AppData\Local\Temp\HouseholdsClicking.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Highways Highways.cmd && Highways.cmd2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:480
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 191523⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Bookmarks" Sv3⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Distance + ..\Butt + ..\Roland + ..\July + ..\Islam + ..\Argentina M3⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\19152\Appliance.comAppliance.com M3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1476
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD53d6d45218dac95051441b7e09e8621b3
SHA1c6a507255b1c846187bcc734699c7b1555924fe6
SHA2566a82008253e0ceb27673ad23527848e51f58abb6e11666cc5cca8a454e9dd244
SHA512fbc7fa801ff84ada49e72b342821706fc145bb2208741e264f29b1cd7172ad2b6215fe8a655fb02004483484cc0e5b57c8d4698943450eebccfd62756582a2ff
-
Filesize
35KB
MD5e1fede06ffa7694324bcf0012bae9fe5
SHA1cbb60a4df15d7cf7e15096b7532c060a97d894e8
SHA256a1f87acfe34ec54bc86497054bb85cbb35dafbf9499bd39b46396dd5c7d8f47d
SHA512101b8d400854ebed2622ed4c01d8ab9e3278720860b8907367fc3716d9b853dad9f209435015e15b0f770776a167b2df704b3163f8d0e31d73b61871f9889b3a
-
Filesize
66KB
MD5f7be54e80d09910e992f0918db991bb7
SHA128efd6516884dfcec50bfcbff371596f80bbd756
SHA256849a886e92e8e3c8d73e2faa569f7023c01a40e41c808d80bc8938a4f0cece76
SHA512b743c0aa129d7d9f606f823dd632e0ae0a8effa746704839e1ed410edc343569e158fa076e6f2ac997c6b185a12044b480a02cd9f032ea95a9571fb02f16cd97
-
Filesize
90KB
MD5973162049ddeb33cd2ba3e2e476f64b0
SHA11deac83ab1224975f1e8572b8cbc5b21384b6044
SHA256b2ac8fbe5d7cb9fab2e3202fe9a0649dec91c7112df587565fac27fbcb18a25e
SHA5124fe741421804ba73e3c49dfd8449c49aad6c0e398e320d6749b869cbf91d297c59139c0ec3977860b8a4a3bb8419166406c63704a81bb7347683bc9057522696
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
86KB
MD57674cbbcb2aca7b63551861bf75f97d0
SHA181ed4da3280bf1abc4d8e3eb9bef10938c64d9c2
SHA256e2cf3658c672c28d3a8d27f6efeb40a497202b1c4f7aa5851d6471dba5e2083f
SHA512479cc5e44828c868bb38bc31588894ae08df8d934ddc4ae4cfdb8e93ae864daed74fefa4845f644762bdc0c1e4533f3d90b5e8602d25467cde1b40b431f53123
-
Filesize
142KB
MD5f7ed04c8febd990111b46fa11bdd8d1d
SHA115d2525cec051b85cd31f337dbe50dc4aeb8e7ab
SHA25606dca7dc1d2c82224a78fed7f59fbe4fe94776fe98fdb9d44cc66e9f4f1c2ebd
SHA51215445c9e187b5b75a8a8b6256eb79571667ae4f3810a122381203e474f33a53dfc16327687f452afdee88e2213476f4dcf262c4a32168685f8ef761bfbfe550d
-
Filesize
100KB
MD5304420c62ed1d9cd3f85d86582fcac5c
SHA1bc0693627b10c59a1a35abbaac45f7286d5fb821
SHA256e0eca4d4bb96bbf101554d6c9a124607604727c3d80784ca51f17cf0dc7b79ae
SHA5120c811009fa23f4e9eb9f9c8ffa81cba3ca03abb65d069242534c8cc29b427a3d2b72ff241fd8a41dc22ada94bb547cd10952d49f317df2ad55d85a4285bd9ccc
-
Filesize
28KB
MD51772a08e66c81359d95f1b6be25c7bc6
SHA13ec3d8d9c7af1cb6e89d92b81761e2518844fc79
SHA2561d3c3c2a3643173a621bffe1ad7deb6752acf927159807cfd1c823773c133a25
SHA51209b91369a720d9b5df2f89619d29113cd12900e9057b53fa34369e43162be4b4ef6308bd2e5b9bab25e0666960efa90b1c7300ff91a56cb09d07bd28d12df06e
-
Filesize
73KB
MD5c0717eaa23e1b4d8ef42ea9e99b89b69
SHA17e6b3b073737732c572642ed689c241d6d8bc077
SHA256bdbe1d6e61b0115d697b5aa9e80d25b453e7474e4e09e559a1832d2dcfdc8fd1
SHA5121e75297cfb2e648859b35c4562b0d95c55daf9ba8e4a66af13565a1bebb646a67c680a1e1ac84b1f69f852b64b0f9d736802273b83df7ddea55de19c709a7a31
-
Filesize
68KB
MD599fa6f1a532385c89e16fef6f954914e
SHA16769f770470df82ad78b32ec1535c345f28fe59c
SHA2560c52aca520b6875005651503a4d6f2b37430a227e9d84fda93252d2aa094705c
SHA51211b81b984a43c03ad5eee5167da72d5581d159ea7a3fafe2bd442bb697915f3d598ac52be0a843755d2aff22dfbda580ccae455bbea879e64475b61e24675db2
-
Filesize
65KB
MD591cb734d0460ba18254e8ff059d6374f
SHA1a7a4053a9c934f5023908f1b83a2a20a137d6c16
SHA256aeb2be9b4e40055826b3f960c271f86e647a92c1db662ed8adf9654ed37c9e82
SHA5123f5c265f4f651780889a82f5ea08d69e1ba0b22c7d2aec865bfecd456e791744b2d3f21168b6e359b0620ed6df0845813546f702f71cae7118ab12c305350113
-
Filesize
124KB
MD5f76d99915dad5d1428306d84fd5cef4a
SHA107c609bc4e5206607858eb56a43c138ad172f3fb
SHA256528c4e90ef35fccfa8acacccc6a3a65bf753f211fb7acc277527921606dd63c5
SHA5129da0f739147c67ab46ba8a896af99a9cbe10b14b8725bdebafc6905dcf5252cc3588250d74a755c380f724e76f968909421858e16ce12075be13709d1069c626
-
Filesize
29KB
MD5139ecbc61c65eeed2c66a743abac82d0
SHA100b2c1a41006975e5d68edea5fcb3203a9f1333a
SHA2566d0498ec0e7b86b819dd86a54cf13515e4eb50569aff18c9ffc944eefda68251
SHA51235c59717c001ac5a894ecb635072d8eea157b8558e385b637c97493e35e3c4d962199d1799756a0d6c0a6310a327280f755564b9383acadab83db7b02624f3c3
-
Filesize
63KB
MD598d45275d84d549cf80b87bd0144d901
SHA1e321e6915f70857315778fdb7061d98e4b81a4e7
SHA25648ed90918079afcc3cb658f5898d643c864f2efc7394fc7353d1ca83f19e7761
SHA5125ba8ef5b24cbf770b3fc07f8251f5cb7beaeabbd03879ccaa0e26a2e529446c8d72fc06a4a40de39516c9df4d893a3a60c682819521a3884fb62724c04a1e149
-
Filesize
98KB
MD5df8fdf5f14b162328c5a1c1a7d883b5a
SHA169b6cfe2fbc4196e7f84a9e615e0aa845d5462e8
SHA2560241ae98f5bc3d7baf64427d3af04029d8fb52362e95c0da931b4a0fdde5d13b
SHA512177d290979eb7b5d1aa1f0660c98e0c4ef9a2949c32e327d0de439e7b5889cd615830f47c350ed12511a9d58b1ce60299edeef64eaf36ea54ddf22e22e76e79b
-
Filesize
141KB
MD5e1a20c475ec5f88b2f289c1e03d35848
SHA112a23b096421755073a19d8f5fbfa031224852c8
SHA256b64877aeadb747e805c85e4818fc3e667fc7107dfcdc5f3e20b819e1d559efef
SHA5123fdbef82ebd83deadfa21d26516d0e4b2eca75d1904afcbb0e64d835d0e1a7ce2eef03dae1202321dee7e30cb4dc556c040ec1038f8ae158f122b26826b98cb9
-
Filesize
64KB
MD5e3c619d6e998064e8e0b65361184ee91
SHA1e5dc3b5d5746e0bf1338e763f559e3478b970283
SHA2564ae3270ea08c657550b1fa048e85e786c7e608bd243a2a6e4a6e70428202ca66
SHA51232c1300c725c3b0c9494bbbba2b0fc87fdd25487e7018f7eac77115301656ec0aefdeafabdf875bcc655967cbeb71d6632fd6f88a4ad03fe9b68dc4f5c6b8831
-
Filesize
707B
MD5fb5e6b5023c95d6b259e8a32c47e4188
SHA1dd075ef6c1e7161253e79224daec20831aff4cc9
SHA25661ca18d2f088e4aa315e0e989e6d0630c394765e655f567ed99ea53ad9e5f851
SHA5127cf610141b7c93ccc7a2f5fa9953a14696a42a0135750c42fb02b4f6bf6ba76a6f5e32b8805fb465173c0d0f87501052e5082497b8e6f7fea299cb6244512e8f
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
130KB
MD5a2ad31b3b39d97e19767812f46d19ead
SHA1e1f31beaac4e5c4ff16ebf916e7bf6a2ce2ad99a
SHA256ee4dedd77c361ec10b10b7a34f727528c0a8c90750088a2658424b8c1569dd5c
SHA5127db651d15b4612be65bf8ec54aff9a6f5c46964150e3aa96c9c656bfaf064b0c8fdd02e6c47c1ee54945b09061fef395e4c31d027372a76941a91a547b84d5e5
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f