Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 04:14
Static task
static1
Behavioral task
behavioral1
Sample
ReFB.exe
Resource
win7-20240708-en
General
-
Target
ReFB.exe
-
Size
80KB
-
MD5
2a8613b7d99903516b8fe02fd820bf52
-
SHA1
78a96addcb556ab1d490fac80f929305263d06b9
-
SHA256
f1d68c5e7c7660d4f2ce412c109b7fe3e088872fa0ebe61ca9ab9dd92a496407
-
SHA512
af0902aeb6169ea507b787da7b61c3533df4610c3f51c1d8f65dfc9008c8ce2580f2d86a49a4d0acc2c51c731f3e4c447d0d1d8e779dc1c75e43d30b79c46436
-
SSDEEP
1536:9A8oAY5SXfidLez+Q+EGfdUHLLXJ+CqoVpPBucQwk7qnKXKo5OMY8xk03ben8TK:M7Ohz+Q+EGlUHLLXJ+CqoTPBucQwktXS
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 348 ReFB.exe -
Loads dropped DLL 7 IoCs
pid Process 3044 ReFB.exe 348 ReFB.exe 348 ReFB.exe 348 ReFB.exe 348 ReFB.exe 348 ReFB.exe 348 ReFB.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 348 set thread context of 1924 348 ReFB.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReFB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReFB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3044 ReFB.exe 348 ReFB.exe 348 ReFB.exe 1924 cmd.exe 1924 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 348 ReFB.exe 1924 cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3044 wrote to memory of 348 3044 ReFB.exe 30 PID 3044 wrote to memory of 348 3044 ReFB.exe 30 PID 3044 wrote to memory of 348 3044 ReFB.exe 30 PID 3044 wrote to memory of 348 3044 ReFB.exe 30 PID 348 wrote to memory of 1924 348 ReFB.exe 31 PID 348 wrote to memory of 1924 348 ReFB.exe 31 PID 348 wrote to memory of 1924 348 ReFB.exe 31 PID 348 wrote to memory of 1924 348 ReFB.exe 31 PID 348 wrote to memory of 1924 348 ReFB.exe 31 PID 1924 wrote to memory of 2656 1924 cmd.exe 34 PID 1924 wrote to memory of 2656 1924 cmd.exe 34 PID 1924 wrote to memory of 2656 1924 cmd.exe 34 PID 1924 wrote to memory of 2656 1924 cmd.exe 34 PID 1924 wrote to memory of 2656 1924 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ReFB.exe"C:\Users\Admin\AppData\Local\Temp\ReFB.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Roaming\ugscheck\ReFB.exeC:\Users\Admin\AppData\Roaming\ugscheck\ReFB.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD507b27eba47b52ccbb4c5b89f0feb3662
SHA144f4953e172ca2b0a73c5f8f75dd72072418f442
SHA2567e66314fd6d4e3ee00a014046e9a65e9ea500cbaeb240f75fb45eb73037379f5
SHA51212896b4b9dec330feef5a299d6da73476397b44b571f4f03f9252c9994446723b4a09ca350fbb1e8c00d17acf872ba4aa7b2527dbda8e9e6a9c408d0a399800c
-
Filesize
411KB
MD503e9314004f504a14a61c3d364b62f66
SHA10aa3caac24fdf9d9d4c618e2bbf0a063036cd55d
SHA256a3ba6421991241bea9c8334b62c3088f8f131ab906c3cc52113945d05016a35f
SHA5122fcff4439d2759d93c57d49b24f28ae89b7698e284e76ac65fe2b50bdefc23a8cc3c83891d671de4e4c0f036cef810856de79ac2b028aa89a895bf35abff8c8d
-
Filesize
752KB
MD567ec459e42d3081dd8fd34356f7cafc1
SHA11738050616169d5b17b5adac3ff0370b8c642734
SHA2561221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067
SHA5129ed1c106df217e0b4e4fbd1f4275486ceba1d8a225d6c7e47b854b0b5e6158135b81be926f51db0ad5c624f9bd1d09282332cf064680dc9f7d287073b9686d33
-
Filesize
2.5MB
MD5fecc62a37d37d9759e6b02041728aa23
SHA10c5f646caef7a6e9073d58ed698f6cfbfb2883a3
SHA25694c1395153d7758900979351e633ab68d22ae9b306ef8e253b712a1aab54c805
SHA512698f90f1248dacbd4bdc49045a4e80972783d9dcec120d187abd08f5ef03224b511f7870320938b7e8be049c243ffb1c450c847429434ef2e2c09288cb9286a6
-
Filesize
8.2MB
MD5831ba3a8c9d9916bdf82e07a3e8338cc
SHA16c89fd258937427d14d5042736fdfccd0049f042
SHA256d2c8c8b6cc783e4c00a5ef3365457d776dfc1205a346b676915e39d434f5a52d
SHA512beda57851e0e3781ece1d0ee53a3f86c52ba99cb045943227b6c8fc1848a452269f2768bf4c661e27ddfbe436df82cfd1de54706d814f81797a13fefec4602c5
-
Filesize
1.0MB
MD58a2e025fd3ddd56c8e4f63416e46e2ec
SHA15f58feb11e84aa41d5548f5a30fc758221e9dd64
SHA25652ae07d1d6a467283055a3512d655b6a43a42767024e57279784701206d97003
SHA5128e3a449163e775dc000e9674bca81ffabc7fecd9278da5a40659620cfc9cc07f50cc29341e74176fe10717b2a12ea3d5148d1ffc906bc809b1cd5c8c59de7ba1
-
Filesize
12.5MB
MD5df68febc876575329e93938eba19848f
SHA1a96949f2782e70911f33937043ac54e6fe48ca24
SHA2563127cbbf3afaeb191ca918175ad4c6bfbdd68f8ce38ffa06206ba543576e84e2
SHA512f0f6dc90dd640a1f90de77e3c99c8306446bfd79d0c4b4f7119e421efd26137a9fb6607de8a229ed4dd8686fd84a2f042334a7e836db1eeab69f33f232fa3385
-
Filesize
799KB
MD5a634e0a7d3ee770d4a6a05faf21065e6
SHA1a9b078d0fc8d218234fd1d57eb612418e0ef80f9
SHA2568006b6f93bb6ad3e70a411c3d29226e57bc550a12feb0036b7ac934d69843df2
SHA512675d9906901712126ce0b00212479d0e1211f397da244dd617cb658f54d12bc42dc1768e49310f694651d173716e0cbde397e5db9cde5dd1cde42add73e9c1f0
-
Filesize
50KB
MD5fec22c03622fb5151eb820ad7580d972
SHA12fe9cc2fcd4fe7a839f9e4c039ebf228b08cbf2a
SHA2567c2aa43307d8d155cafcbce4c3f3ddbdc2dcfb60ec8c4b44a3bf03e26c85f267
SHA512aa736cdcd63810b7ddcc206d9d073ef4a21dd87720e54be3775a5bbf8422c4791e78a7bf1136632eaa376e7c9275a9a19ba39235bde39eb847f401f5d3e2cb06
-
Filesize
80KB
MD52a8613b7d99903516b8fe02fd820bf52
SHA178a96addcb556ab1d490fac80f929305263d06b9
SHA256f1d68c5e7c7660d4f2ce412c109b7fe3e088872fa0ebe61ca9ab9dd92a496407
SHA512af0902aeb6169ea507b787da7b61c3533df4610c3f51c1d8f65dfc9008c8ce2580f2d86a49a4d0acc2c51c731f3e4c447d0d1d8e779dc1c75e43d30b79c46436