Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 14:09
Static task
static1
Behavioral task
behavioral1
Sample
00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe
Resource
win7-20240903-en
General
-
Target
00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe
-
Size
70.0MB
-
MD5
062791084ec4605d7bbacf1105f5b885
-
SHA1
dc68b7eb995dc6462016e18c90fb5ecb2311e290
-
SHA256
00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447
-
SHA512
a5ecbe3995ed230fc92ecb9e0566a36bd7c7ee26e160952b94c694ec6cedb4359366aee0e9fa4c404f05f4c64b70fa6bff0578f24f77f1501d5ae4af4c1a0a67
-
SSDEEP
24576:PcdAO+ciGEFSv5osh93ZkB0CMBR3EkuKrpXSsfN1htUIyDcOc7O7g:kMGNhBWK5BR3EkZNp1yDcx
Malware Config
Extracted
lumma
https://preside-comforter.sbs/api
https://savvy-steereo.sbs/api
https://copper-replace.sbs/api
https://record-envyp.sbs/api
https://slam-whipp.sbs/api
https://wrench-creter.sbs/api
https://looky-marked.sbs/api
https://plastic-mitten.sbs/api
https://lumharmonyfields.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 2820 Confusion.com -
Loads dropped DLL 1 IoCs
pid Process 2084 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1328 tasklist.exe 1912 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\DevelopmentsGraham 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe File opened for modification C:\Windows\GraduatedCredit 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe File opened for modification C:\Windows\MaterialsFunny 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe File opened for modification C:\Windows\EconomyFinances 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Confusion.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Confusion.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Confusion.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Confusion.com -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2820 Confusion.com 2820 Confusion.com 2820 Confusion.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1328 tasklist.exe Token: SeDebugPrivilege 1912 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2820 Confusion.com 2820 Confusion.com 2820 Confusion.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2820 Confusion.com 2820 Confusion.com 2820 Confusion.com -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2084 2932 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe 31 PID 2932 wrote to memory of 2084 2932 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe 31 PID 2932 wrote to memory of 2084 2932 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe 31 PID 2932 wrote to memory of 2084 2932 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe 31 PID 2084 wrote to memory of 1328 2084 cmd.exe 33 PID 2084 wrote to memory of 1328 2084 cmd.exe 33 PID 2084 wrote to memory of 1328 2084 cmd.exe 33 PID 2084 wrote to memory of 1328 2084 cmd.exe 33 PID 2084 wrote to memory of 1324 2084 cmd.exe 34 PID 2084 wrote to memory of 1324 2084 cmd.exe 34 PID 2084 wrote to memory of 1324 2084 cmd.exe 34 PID 2084 wrote to memory of 1324 2084 cmd.exe 34 PID 2084 wrote to memory of 1912 2084 cmd.exe 36 PID 2084 wrote to memory of 1912 2084 cmd.exe 36 PID 2084 wrote to memory of 1912 2084 cmd.exe 36 PID 2084 wrote to memory of 1912 2084 cmd.exe 36 PID 2084 wrote to memory of 1948 2084 cmd.exe 37 PID 2084 wrote to memory of 1948 2084 cmd.exe 37 PID 2084 wrote to memory of 1948 2084 cmd.exe 37 PID 2084 wrote to memory of 1948 2084 cmd.exe 37 PID 2084 wrote to memory of 2164 2084 cmd.exe 38 PID 2084 wrote to memory of 2164 2084 cmd.exe 38 PID 2084 wrote to memory of 2164 2084 cmd.exe 38 PID 2084 wrote to memory of 2164 2084 cmd.exe 38 PID 2084 wrote to memory of 2708 2084 cmd.exe 39 PID 2084 wrote to memory of 2708 2084 cmd.exe 39 PID 2084 wrote to memory of 2708 2084 cmd.exe 39 PID 2084 wrote to memory of 2708 2084 cmd.exe 39 PID 2084 wrote to memory of 2820 2084 cmd.exe 40 PID 2084 wrote to memory of 2820 2084 cmd.exe 40 PID 2084 wrote to memory of 2820 2084 cmd.exe 40 PID 2084 wrote to memory of 2820 2084 cmd.exe 40 PID 2084 wrote to memory of 2984 2084 cmd.exe 41 PID 2084 wrote to memory of 2984 2084 cmd.exe 41 PID 2084 wrote to memory of 2984 2084 cmd.exe 41 PID 2084 wrote to memory of 2984 2084 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe"C:\Users\Admin\AppData\Local\Temp\00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Gst Gst.cmd && Gst.cmd2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"3⤵
- System Location Discovery: System Language Discovery
PID:1324
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3666943⤵
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Hardcover + ..\Palestine + ..\Marked + ..\Chargers + ..\Important + ..\Bloomberg d3⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\366694\Confusion.comConfusion.com d3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2820
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
495KB
MD5967367e7bc3abdd43001ac80771bbc69
SHA14c85bc55a4c97a836d8ec3fa938418c76a908ab5
SHA25606c48947250eba20b9911955fb38d53d5983109a6bf9e03da13c313c08ebbc1c
SHA512108c9f54d3e1eda3bde8c4e9473b95202760b370ef61b8f09f1412ff2312df9bcb6f0cbd20ff2b3687c4dbc1c7853a872c856856eb947a17d20abbba9a7287c3
-
Filesize
66KB
MD591ce1eb0208993a4cc3fb34e1546f426
SHA1fac48e9ef003c665fd09bf6f0c2989440bc3fc71
SHA2564d243732b785b2e7f59b2eecacaf84a5b2208a8edb021ba334ae8e9c6627abc4
SHA51224177d1ab703994908caa39f41ce78bd98e69529f8e855e21e9baed5e0fdeb78d7b677b6a6a4901344bfa790800db3488c1389e88fc9ce30ce8550aa1d041116
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
80KB
MD5eebbb090700c0267918bd6d3c62a3dcb
SHA11f710f6d79fe533a2ec9ab7d9687693137d48453
SHA256eba892494b1c5c907a759c4117324364c8578e1055cb83771690e72363973263
SHA51293e5fb9e90186b5bb606e945e390d7f0f5a76478bb26427452cb810b0a2f48209e417c12216fb82d8582fb95cb3e8a13f391e1d76f407eea89214c9480a16bff
-
Filesize
18KB
MD5525a1fbfd01b226cdd9567311120ece3
SHA193b3b1cdc48d809fd75b005d665e7a1847056f3b
SHA25608866f002a9a44c8fadf47ced1a4a4ee884a349e0b41feed9496707ad424ea31
SHA512131cbdf48f43fbd28521aa255e89f6e6a5156ab50d7061f0b0afc951e21d604b954b55a3cf68b3e145a32f38118957b6549e61b58d89ff47f4c73aea1bf2360b
-
Filesize
84KB
MD5149c1b7a5fd92f6ce76e31259b6cc694
SHA1d95ff1e129134d522f4a078e0cbe31aca2104739
SHA25661129bc10a6cc409aabc5618e1badd406ebd115a2e1605eee246b50b57087253
SHA512b93971f864f44c12cdf721ee37f1a94b80b1b9faa3370eda66325bf827a988dde058e19751cf0f82ea2a2b8f55e9b73cc65aea392ccd96e8379c042fb9742fae
-
Filesize
87KB
MD56d0f8d8f9a768ac700ea461ad028b82a
SHA14445ce81851cc1d4cd5f9654d0bb97e2023a277a
SHA25606ee6af7e165f13d40c0c303a149bcb8ac047cf4bb719c15c6b212c9c71e4327
SHA5129b0b07660fd8bfa21ec211daf704ae75f0b8ef1ced70475e9e27888e288a5293bf5a4d09e2413660c6e9a429ce943e9c8f5eecbb4224fe286b1f5c876a003205
-
Filesize
91KB
MD5c4b6b683cd11871d48887170d648b730
SHA148f6cea1569c5010589cfc920209bda425391a7e
SHA256f5352a91d4be396fa5a34f8a24c83bfbe7f7675fa56c4d9413ebd3b232cbc775
SHA51250f1fbb10044070520563c06fb30d92c18e3e5f8b9c6276d934b65f462357bf7d87090e43ef53447571c65219e26c9ce3a695018c5611b9860d642a0226cb219
-
Filesize
87KB
MD506263e5e099db2ac80685c8e0cf24157
SHA1044ea93d3a9cf211c2c799a3cecbc691e3490d33
SHA2560712dab7f1a3aad3ccacaf351eb05158ed6b23ac522e7b6b386bf5788d7adfb7
SHA512e556560ae12d2e13fb9f4cb6f613ba4389cdc938e32e76a73db4e01237f929179b0f633f2bf1ed6973073314e63f0c04f4ab1d834953c2e7b291ee93fe6007fb
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
872KB
MD5d7bf348096e384a360a291c002c905b3
SHA1b360b8869bbae24d8fa2262afdf4cffcb028cd77
SHA256ceb9d4dfbd2602d2827051c969a54f4b22910c7557d4f71c8f6529cd7720c2c7
SHA512351ee7216bfc3eb0cdbb9ce6760ef70a4e4ff029b8071f74b5a5208cd7edc55cff7f2a8b2f0ecc1ca47cee3a77ba8fef1727848c0c1453e00cdab73ee2085105
-
Filesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0