Analysis
-
max time kernel
42s -
max time network
43s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-01-2025 16:11
Static task
static1
Behavioral task
behavioral1
Sample
[x86-х64]_Helper_.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
PA$$W0RD 1212
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
[x86-х64]_Helper_.rar
Resource
win11-20241007-en
General
-
Target
[x86-х64]_Helper_.zip
-
Size
4.5MB
-
MD5
a7292171c5fb9c358ee694be707dc5c0
-
SHA1
f0b3781e4ff36efeaeeb779bfed6deabc0da3a58
-
SHA256
3bbd66121922f68da4df1c5b46b87b166a62cc48254f5b398225778c2f7537aa
-
SHA512
6119f54a319a79e14e1298b6e2c1156699841193d6b32790ae0e9175efc0681e057d10671067dfff91d2720a16909b3de86ee76eee05c95f06d1698a0c18f624
-
SSDEEP
98304:CiAJ/5hfp2NSjl1RytjJrTfIrVS9MNsDX0VlQM7DgZqNzP:CzYQh10NrTiS9BgjQM7Dgq
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
https://jumplilltk.cfd/api
Signatures
-
Lumma family
-
Executes dropped EXE 4 IoCs
pid Process 4564 [x86-х64]_Helper_.exe 3396 [x86-х64]_Helper_.exe 716 [x86-х64]_Helper_.exe 4760 [x86-х64]_Helper_.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [x86-х64]_Helper_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [x86-х64]_Helper_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [x86-х64]_Helper_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [x86-х64]_Helper_.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4564 [x86-х64]_Helper_.exe 4564 [x86-х64]_Helper_.exe 3396 [x86-х64]_Helper_.exe 3396 [x86-х64]_Helper_.exe 716 [x86-х64]_Helper_.exe 716 [x86-х64]_Helper_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3796 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 3796 7zFM.exe Token: 35 3796 7zFM.exe Token: SeSecurityPrivilege 3796 7zFM.exe Token: SeSecurityPrivilege 3796 7zFM.exe Token: SeSecurityPrivilege 3796 7zFM.exe Token: SeSecurityPrivilege 3796 7zFM.exe Token: SeSecurityPrivilege 3796 7zFM.exe Token: SeSecurityPrivilege 3796 7zFM.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 3796 7zFM.exe 3796 7zFM.exe 3796 7zFM.exe 3796 7zFM.exe 3796 7zFM.exe 3796 7zFM.exe 3796 7zFM.exe 3796 7zFM.exe 3796 7zFM.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4564 3796 7zFM.exe 77 PID 3796 wrote to memory of 4564 3796 7zFM.exe 77 PID 3796 wrote to memory of 4564 3796 7zFM.exe 77 PID 3796 wrote to memory of 3396 3796 7zFM.exe 80 PID 3796 wrote to memory of 3396 3796 7zFM.exe 80 PID 3796 wrote to memory of 3396 3796 7zFM.exe 80 PID 3796 wrote to memory of 716 3796 7zFM.exe 81 PID 3796 wrote to memory of 716 3796 7zFM.exe 81 PID 3796 wrote to memory of 716 3796 7zFM.exe 81 PID 3796 wrote to memory of 4760 3796 7zFM.exe 84 PID 3796 wrote to memory of 4760 3796 7zFM.exe 84 PID 3796 wrote to memory of 4760 3796 7zFM.exe 84
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\[x86-х64]_Helper_.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\7zO4DE58067\[x86-х64]_Helper_.exe"C:\Users\Admin\AppData\Local\Temp\7zO4DE58067\[x86-х64]_Helper_.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\7zO4DEF7587\[x86-х64]_Helper_.exe"C:\Users\Admin\AppData\Local\Temp\7zO4DEF7587\[x86-х64]_Helper_.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\7zO4DE3D7B7\[x86-х64]_Helper_.exe"C:\Users\Admin\AppData\Local\Temp\7zO4DE3D7B7\[x86-х64]_Helper_.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\7zO4DEED9F7\[x86-х64]_Helper_.exe"C:\Users\Admin\AppData\Local\Temp\7zO4DEED9F7\[x86-х64]_Helper_.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4116