Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 11:52
Static task
static1
General
-
Target
vs-game-force-sof.zip
-
Size
8.4MB
-
MD5
6fe73c8cc8c7b5d5817022c53779d547
-
SHA1
16a8c5c1bca86b64a7e90823f19af40bfcf1590d
-
SHA256
dfaca0b7dffb83c75470cd4e018fdfce420f6c2880c84c652ef56b8d9fcf249b
-
SHA512
32828ab2fd1f60e6cf1825c5bc710bb3962b684f69d2d47915ff40356a9ee595620ac96a175e9002eb70d153efb019c4d213fbb6a23cdb39d53c2071d22faa18
-
SSDEEP
196608:szYQh10NrTiS9BgjQM7Kb6RhEYTFkGyWgOsgjK/G5xFAIX:s0C8TiEgjQi3hEGFTso1AIX
Malware Config
Extracted
Family
lumma
C2
https://inflameopooi.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 2708 vs-game-force-sof.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vs-game-force-sof.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 vs-game-force-sof.exe 2708 vs-game-force-sof.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4024 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 4024 7zFM.exe Token: 35 4024 7zFM.exe Token: SeSecurityPrivilege 4024 7zFM.exe Token: SeRestorePrivilege 4244 7zG.exe Token: 35 4244 7zG.exe Token: SeSecurityPrivilege 4244 7zG.exe Token: SeSecurityPrivilege 4244 7zG.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4024 7zFM.exe 4024 7zFM.exe 4024 7zFM.exe 4024 7zFM.exe 4244 7zG.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe 868 OpenWith.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\vs-game-force-sof.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4024
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3832
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\vs-game-force-sof\vs-game-force-sof\" -ad -an -ai#7zMap29277:132:7zEvent159061⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4244
-
C:\Users\Admin\Documents\vs-game-force-sof\vs-game-force-sof\vs-game-force-sof.exe"C:\Users\Admin\Documents\vs-game-force-sof\vs-game-force-sof\vs-game-force-sof.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2708