Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 18:37
Static task
static1
Behavioral task
behavioral1
Sample
cyberiacheat.exe
Resource
win7-20241010-en
windows7-x64
5 signatures
150 seconds
General
-
Target
cyberiacheat.exe
-
Size
753KB
-
MD5
4316b5ce72ec3306d1a7efa91b1d125d
-
SHA1
0e8028ec732c39d7e714ad69a835c5f4bba84a32
-
SHA256
81780a129aa4565b040c2857eeacdd49cb14b31ddaff9390e910198d8ee640a3
-
SHA512
faf5ad304c44493be3e01dbcd5e86e2903624b52ce8cb3f4a9e241212fd3fe224a54ab8206b2c5f05dca4170748f906fc679ab6303f5bf56a688b82a1a26dbe5
-
SSDEEP
12288:+mOcxtujRaiWdR0/DXRItz3N+A4puMdlWnRStliWdR0/DXRItz3N+A4puMdlWnRP:TGgiWdReDXC536puMdljliWdReDXC53H
Malware Config
Extracted
Family
lumma
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3764 set thread context of 100 3764 cyberiacheat.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyberiacheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyberiacheat.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3764 wrote to memory of 3368 3764 cyberiacheat.exe 84 PID 3764 wrote to memory of 3368 3764 cyberiacheat.exe 84 PID 3764 wrote to memory of 3368 3764 cyberiacheat.exe 84 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85 PID 3764 wrote to memory of 100 3764 cyberiacheat.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cyberiacheat.exe"C:\Users\Admin\AppData\Local\Temp\cyberiacheat.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\cyberiacheat.exe"C:\Users\Admin\AppData\Local\Temp\cyberiacheat.exe"2⤵PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\cyberiacheat.exe"C:\Users\Admin\AppData\Local\Temp\cyberiacheat.exe"2⤵
- System Location Discovery: System Language Discovery
PID:100
-