Analysis
-
max time kernel
24s -
max time network
25s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-01-2025 02:20
Static task
static1
General
-
Target
Temp-Spoofer-Lifetime-main.zip
-
Size
1.4MB
-
MD5
4f37485f6c5f7a7aa4505161e1dea49d
-
SHA1
80298bea7b2361f3b4051e92408d065090538da6
-
SHA256
53b3fdd2a57c347ed62b00b3e7a5656b87459b9e6a7d85e4891a1a08b8f03b46
-
SHA512
3eb507aeb75652065294c96cedf01506f5c4073bd23c2394df7373710bbf492ec5e5c14864aa0d67f5d250464ce2c31170b03712448208b48b8e692e2595e5cd
-
SSDEEP
24576:k6UGpuVhxFetCJg7vdGZj+orESSGx6XflRyR8cpE2I0gxiO521UcgazBGAVZ:k6vuPx4tCJg7vEZjFr1x+fYjB22LFVZ
Malware Config
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 10 IoCs
pid Process 5064 TempSpoofer.exe 1796 TempSpoofer.exe 3416 TempSpoofer.exe 4948 TempSpoofer.exe 1328 TempSpoofer.exe 2016 TempSpoofer.exe 4916 TempSpoofer.exe 3140 TempSpoofer.exe 4876 TempSpoofer.exe 4444 TempSpoofer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5064 set thread context of 1796 5064 TempSpoofer.exe 83 PID 3416 set thread context of 1328 3416 TempSpoofer.exe 87 PID 2016 set thread context of 4916 2016 TempSpoofer.exe 90 PID 3140 set thread context of 4444 3140 TempSpoofer.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSpoofer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 400 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 400 7zFM.exe Token: 35 400 7zFM.exe Token: SeSecurityPrivilege 400 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 400 7zFM.exe 400 7zFM.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 5064 wrote to memory of 1796 5064 TempSpoofer.exe 83 PID 3416 wrote to memory of 4948 3416 TempSpoofer.exe 86 PID 3416 wrote to memory of 4948 3416 TempSpoofer.exe 86 PID 3416 wrote to memory of 4948 3416 TempSpoofer.exe 86 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 3416 wrote to memory of 1328 3416 TempSpoofer.exe 87 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 2016 wrote to memory of 4916 2016 TempSpoofer.exe 90 PID 3140 wrote to memory of 4876 3140 TempSpoofer.exe 93 PID 3140 wrote to memory of 4876 3140 TempSpoofer.exe 93 PID 3140 wrote to memory of 4876 3140 TempSpoofer.exe 93 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94 PID 3140 wrote to memory of 4444 3140 TempSpoofer.exe 94
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Temp-Spoofer-Lifetime-main.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:400
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3212
-
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"2⤵
- Executes dropped EXE
PID:4948
-
-
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1328
-
-
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4916
-
-
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"2⤵
- Executes dropped EXE
PID:4876
-
-
C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"C:\Users\Admin\Desktop\Temp-Spoofer-Lifetime-main\TempSpoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD53c4161be295e9e9d019ce68dae82d60a
SHA136447fc6418e209dff1bb8a5e576f4d46e3b3296
SHA2560f6481dabf7871823f259eb95f3b85c37d1de8a7d1884ac77a97d887cf96f75d
SHA512cfa2d491a5d28beb8eb908d5af61254ac4c4c88e74c53d5d00ae15ef0731df1654304199996545d1074814c0ea8a032957b28d70774f05347616428e667f70e6