Analysis
-
max time kernel
92s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 07:33
Static task
static1
Behavioral task
behavioral1
Sample
tesr.exe
Resource
win7-20240903-en
General
-
Target
tesr.exe
-
Size
12.1MB
-
MD5
4f96b4d0061d45b08d73e3526d82630f
-
SHA1
15d6d2445d55db393adf30f0bf7f4b649c098257
-
SHA256
30bc5b4729f0ae6ea5e1eb44654e739040f29941b5e6d2436b10ae93a98e5e6b
-
SHA512
6b50eb6e642adb840497b95e0dd5248054752027c15627c2a6262a4e7497c78d1a7eb7b1936c7d8c6f94557b99fcb465e5514f707e04f5f7cc1efee69216a372
-
SSDEEP
393216:R34OXjrnjnEEQWbPbqeQ2K3G/JXa42gqf:R4I/njtQOr50Sqf
Malware Config
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3616 set thread context of 2612 3616 tesr.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxdiag.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3616 wrote to memory of 2612 3616 tesr.exe 82 PID 3616 wrote to memory of 2612 3616 tesr.exe 82 PID 3616 wrote to memory of 2612 3616 tesr.exe 82 PID 3616 wrote to memory of 2612 3616 tesr.exe 82 PID 3616 wrote to memory of 2612 3616 tesr.exe 82 PID 3616 wrote to memory of 2612 3616 tesr.exe 82 PID 3616 wrote to memory of 2612 3616 tesr.exe 82 PID 3616 wrote to memory of 2612 3616 tesr.exe 82 PID 3616 wrote to memory of 2612 3616 tesr.exe 82 PID 3616 wrote to memory of 2612 3616 tesr.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\tesr.exe"C:\Users\Admin\AppData\Local\Temp\tesr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\dxdiag.exe"C:\Windows\SysWOW64\dxdiag.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2612
-