Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 03:40
Static task
static1
Behavioral task
behavioral1
Sample
856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe
Resource
win7-20240903-en
General
-
Target
856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe
-
Size
1.0MB
-
MD5
047187c8dc466a354acb17192de48bdd
-
SHA1
1bf147c660bce0a5627d68e2f67c936ec38a8633
-
SHA256
856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463
-
SHA512
8aa2ee92fc73240f7cebe5c7433076a62bdf403d8b97ac6d0cbc3ec3b8b808ece418a5f836f84d5baf0b6cab44f85ddff556f3e6bad5474e0e257e5cc1d2e7a1
-
SSDEEP
24576:OUiOgNMUUHR4cR4/vj52mC/NqIB3X4RrBhFs:9BgW7HRb4vFq4RFhFs
Malware Config
Extracted
lumma
https://unwrittenuzy.shop/api
Signatures
-
Lumma family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe -
Executes dropped EXE 1 IoCs
pid Process 3156 Challenged.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2020 tasklist.exe 5112 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\EnormousProposals 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe File opened for modification C:\Windows\ParksCast 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe File opened for modification C:\Windows\DvOptimal 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe File opened for modification C:\Windows\RemainedDivine 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Challenged.com -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3156 Challenged.com 3156 Challenged.com 3156 Challenged.com 3156 Challenged.com 3156 Challenged.com 3156 Challenged.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2020 tasklist.exe Token: SeDebugPrivilege 5112 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3156 Challenged.com 3156 Challenged.com 3156 Challenged.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3156 Challenged.com 3156 Challenged.com 3156 Challenged.com -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3960 wrote to memory of 5068 3960 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe 83 PID 3960 wrote to memory of 5068 3960 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe 83 PID 3960 wrote to memory of 5068 3960 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe 83 PID 5068 wrote to memory of 2020 5068 cmd.exe 85 PID 5068 wrote to memory of 2020 5068 cmd.exe 85 PID 5068 wrote to memory of 2020 5068 cmd.exe 85 PID 5068 wrote to memory of 2080 5068 cmd.exe 86 PID 5068 wrote to memory of 2080 5068 cmd.exe 86 PID 5068 wrote to memory of 2080 5068 cmd.exe 86 PID 5068 wrote to memory of 5112 5068 cmd.exe 88 PID 5068 wrote to memory of 5112 5068 cmd.exe 88 PID 5068 wrote to memory of 5112 5068 cmd.exe 88 PID 5068 wrote to memory of 1432 5068 cmd.exe 89 PID 5068 wrote to memory of 1432 5068 cmd.exe 89 PID 5068 wrote to memory of 1432 5068 cmd.exe 89 PID 5068 wrote to memory of 2172 5068 cmd.exe 90 PID 5068 wrote to memory of 2172 5068 cmd.exe 90 PID 5068 wrote to memory of 2172 5068 cmd.exe 90 PID 5068 wrote to memory of 5000 5068 cmd.exe 91 PID 5068 wrote to memory of 5000 5068 cmd.exe 91 PID 5068 wrote to memory of 5000 5068 cmd.exe 91 PID 5068 wrote to memory of 4100 5068 cmd.exe 92 PID 5068 wrote to memory of 4100 5068 cmd.exe 92 PID 5068 wrote to memory of 4100 5068 cmd.exe 92 PID 5068 wrote to memory of 3132 5068 cmd.exe 93 PID 5068 wrote to memory of 3132 5068 cmd.exe 93 PID 5068 wrote to memory of 3132 5068 cmd.exe 93 PID 5068 wrote to memory of 3676 5068 cmd.exe 94 PID 5068 wrote to memory of 3676 5068 cmd.exe 94 PID 5068 wrote to memory of 3676 5068 cmd.exe 94 PID 5068 wrote to memory of 3156 5068 cmd.exe 95 PID 5068 wrote to memory of 3156 5068 cmd.exe 95 PID 5068 wrote to memory of 3156 5068 cmd.exe 95 PID 5068 wrote to memory of 4844 5068 cmd.exe 96 PID 5068 wrote to memory of 4844 5068 cmd.exe 96 PID 5068 wrote to memory of 4844 5068 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe"C:\Users\Admin\AppData\Local\Temp\856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Boat Boat.cmd & Boat.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6861053⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Attend3⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "molecular" Awards3⤵
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 686105\Challenged.com + Recorded + Mtv + Companies + Sonic + Fin + Wired + Quick + Occupation + Developmental + Shield 686105\Challenged.com3⤵
- System Location Discovery: System Language Discovery
PID:3132
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Appropriate + ..\China + ..\Depth + ..\Kyle + ..\Latvia + ..\Taught Q3⤵
- System Location Discovery: System Language Discovery
PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\686105\Challenged.comChallenged.com Q3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3156
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50b0564f10fcc49ed87ab79fe5e55fd1d
SHA1f161c204249c1095cf85f5d4c627f36168b41729
SHA25679fbc67a923692ecdd524ffa40946b9bd50db4af476c7c0ac3e056b397f554b7
SHA512e4dffe47d02f5dd31785b556c05e27e9fd701d9c278aac1f1f0250b0f06171222ca237ce576c960115da8ab74bc65574452d124e64320b8640b6a94adc23556d
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
465KB
MD54eea8ef05e53a0e932f541f782fe04f5
SHA118dee77234a6196c0b88c38019d0260e60aea089
SHA25618d0b04337185f18901ce6a3fccab9669871dd68c1ba18c4fc5d8ebd18f842a0
SHA5121aac5e816a736a1dcb45fae8a9b501c1ce042f133e6a6da6aa04d6bb7da7f5128ca6c979b6c6f72468e04757895466dd6b14a27636c8ea74a23b34ae83cc7e74
-
Filesize
79KB
MD5889b4df8e02c44f15d928979a1526a89
SHA120c4b9f1753080e78800ba06f769653d5d9b88e6
SHA2564522abc9637f7ecd25589017b66746ff4baf20c9e155c6ca898f143eafe13151
SHA512e36aba468fd7b8e70bf887ff05a23cba72e1151d14187b560395516a845dde2481982c215c29a179f8ac8800d2b41ae5ccd20da40793514fb76800f100ed5d54
-
Filesize
478KB
MD5a21648eecc1ffe4a3c22bbaa26be3620
SHA180220f8ce3bc9045d4ef3a582d7600d0f6b29f72
SHA256a2877ddc986c2f4a64c1e524ff2a254d7c9f7d7a385862e57d882adfef2be75f
SHA512a06b78aed979dcadfac9e9b460c7faf33d3085943ee0d496947a1faa7ded0a129e56a81320a4a0fd44db5f19860dc79117c6365c6352341b92b316c42ed859c3
-
Filesize
2KB
MD511beed5ec40a6661f00a9dcb0d172532
SHA19add533cf3f32a9995c237a0f785f63711d72d4b
SHA256736138481ec159225ca4d2db5fd9bdbc686f635dccac7a413fcfe6f13f3dae22
SHA512bffda16a687661c6c2a44960aa5f5d134b571b886abbe80d81027f60ee2c51c22cda3d3d1587f8de7c8635aac45470819d0d79dc3a576c7273b2219611190d85
-
Filesize
11KB
MD5981d8595db467ddb19ab9ce140333d86
SHA126ab8d6ffa7797b1198bbbd3d92403ec357f73e2
SHA256ad9c3f5967d09c5a1ab46ef960761f8de0b72dd049a18883036e6689f8e17c64
SHA512bada40f6cebfb715fb9e88b7fa57b9fa3b86cacb1eb2ba661eaee3af197ac5f1c925fbda36e4c5803eeccade9a6c92d993a1236bf5759c25e1399f848fb2a5ec
-
Filesize
50KB
MD5e8e5ea080e74fc4a214cb16959fc90d9
SHA1ed30cff176bea84f2688c0e63c209a17ace16fb2
SHA256ca88df3defb2382dcce752205f72d5d04016701463a375c0abd1edcae957dc4b
SHA5129908c13bc90358fc1dc5611856137b4af76ed95be2d155d072f2f0bd3394474e78d225f05c849e0edd00e7970e25a286dd5209c79ee1fb2a37618460bdd7beb5
-
Filesize
64KB
MD54a8e3a487e281003724f042c068452ee
SHA184f463cc6e983fd57b63edac6530b41bfb447dab
SHA256cb88804b935c409e4acd609145289010dfffd14c41d61be3ed0afcb80584eeea
SHA5125c84882c87882cea482ac060f3bc4f611faaaa16ddb214e36187f89e177dc485773f872cce229d0a78e3d0bac1577681c99501ebc65542aceb015231ca2468bb
-
Filesize
94KB
MD5fb08bfbba7bbfaffb1bef33bec0325b0
SHA1cb5c2bb594356dec00dcd2b7efa43fe2fc6b42ef
SHA256b9537b016b1d602532c1f4dc635ab8313ed26b18dc4f449cd6bf79541c32d64f
SHA51231b8c85cd227921a1ef99a341c3ace5b19463ba9b8302389ffcde0a1f65d2902dd65bb1bd10967610c3e7bd622f209c9959d9e8c9d951acdbbda4d43469a1829
-
Filesize
113KB
MD5d961b5ef55b28b1c8bd2e01ac2fc727b
SHA113d92b9408efd5d75b89bfcaf71c767493566e49
SHA256be316c27f60f8425bb8c3147f57f9a5f6ed0bd6cb4ae6deb01e4c4139bca5b9d
SHA5126d9e317aca5ad47c0578146a4f17f5bc17e3b9e03cd7a1d83f2a42adaeecb0676132402615a2e458e380919c3f6173439c911fda028e255490ef50b606e86dc1
-
Filesize
103KB
MD5487e92f25b04be93dc5ba74fb4a1b1b5
SHA1e33f756a9e9903ce42147f41c98a73e9d9808bb1
SHA2564064c9b3d6ca23dfa3c649acf6063c6943564a7e1b0a229272bdbb3ab7d4c366
SHA51291edbc05794a25d7b8b6d896bddb6e7b8b175a3ece3b01ad96dcf27a2b344d6a38e768e0a00c6131044f448be67a066ce18a3a1264d1db351e6592f6c2bb200e
-
Filesize
95KB
MD58e79818b013611e0e14a773ec6a06fc6
SHA1f77ab0acee0b4c51bf6a554a5102a7f02e78e3d2
SHA256395ccc10db87bc5c7dd79f7f897cc449e70be70cb20c0982b7d41ea040283598
SHA512bfc8b33b183828221b1938ab2019eb00b6c55d9c13dc0df9492d2e44860e23b93af89024fe1cd561c7c48623b0d17859b08b59f3d65be0f6f9f4f1ea8e4dd3cd
-
Filesize
87KB
MD57a029bfe59cd61dcfffa55f8b742d841
SHA1f82aa42c407dc648f7b3d88fba819664d172ad72
SHA256e33cb6f432ca1fe7b7ae317a2fc761542514201e9835b2bb98d7eab7b3bb43a7
SHA512036ae62461493ca65382ea2506e3da7a8356c17bf4e90584624f6f51bb2bea36ee73509aa4d78927ade57506be0488b3f53eaa5028c28248d8a0af5f0939a373
-
Filesize
139KB
MD57b57f0747ffcbc6352d12f2e4f6f420a
SHA1228758f94f5531cdf2edc5a76777d6b85b00408c
SHA25655caa179db8c37f3eaaa145a36a586a9a9cbb0359e87c0797d7711c419ba6803
SHA512d27974b6a24e5fe8de7cf9c5fd1e2adb911a1da46b25001294b567ca718cfc774f5308081938c914b563070ba5361d181edb320e01f883c446d398c380444ebc
-
Filesize
83KB
MD59057c390318cfa1ddd9d6286bb8a805a
SHA1fe30919fe9069e01e0d8483c7ec2c078380c8ac2
SHA25623c0cad22e59a1838a557aa4af1ddc4b727cd6171f475434bfbd6bf9069bd502
SHA5121d26aa3eb7f30096ad08accc4aa0190c142a10ccd1bf20da870da3541c051b0a3cdb7fce6265fbfcb6b89edc0fb3e6f50f4041e7977972be825c888d60dd926b
-
Filesize
81KB
MD51c3c56941ea2347652d7e8b21fc78343
SHA1e194e37057f0940de764090686e0cf972f9d9496
SHA256ace39f0b7357d6ff14f4ea0d4eeb6ba2e88b9838e4826f9b4213c91218140738
SHA51290d99737e07b0b9df208ff7f3a2aa1790679174930e74d3a3e09d00d888a6b16b02759baa029194bed02b03e16198bdb77518bbd72e6c31a24b04543b4ccae9c
-
Filesize
91KB
MD551de0bd5547038d9d31f708f34390200
SHA1969131aed62c3bb2a0c5398df79d5e7d7588540b
SHA25605c9f35758b75c7017a5a1afd9c15108c832f11910a9c87f33d63148a80386a2
SHA512870d407b3aede5689ad67c8bfbd6607ee90594559e88cbcfff0bcde674f24e4600a8efd1c2bc9db003a861115cd51e0ba4ba8f819117b2cc0c735f7cefc45e32
-
Filesize
35KB
MD53a13a6d858eb5a2c7f5a8ae68ed28de3
SHA1f1fd6a4292805f8882bd35ccff3da7c038fc33a1
SHA25623376867d6e7ab3f03913a7579a544a85d5288ec66977f19871155e518c5b46f
SHA5125168cd3f54ab31be4a3b6f140f9a3fc6ec40f1dc1ac5c5f0e81d60eb892f96067ea4a26a685a56ba76dc48997d53bd444e0f2d5a72a93d49684e563933cf1a34
-
Filesize
145KB
MD5d92f2a66972b9faa8de548c1fced8691
SHA18129a94738378fea02a022c7e43b17bace4dedc8
SHA25634d674fccf583e278517993629e56a8895c321cbcd0f99c1d7fbac613d28f7a1
SHA512e1ff6699330e4d1a93d60c0dd20184a4f5f6cf6b7b55b572699326dd75fad10facf695632b7d33d9f692c63ad472002e4364f932ddef9273eb029c6e02b95a87
-
Filesize
60KB
MD56f304e5f2a7926d4a1a17f2cd8cc7f6f
SHA113621fdb96f56d451ceadbae0640d37e8863f646
SHA256ebf9c51228a91209a8cd5680b4ba8a6497bbfcc0b602723e8772590b966eceb2
SHA5122186d136c4f2a4f458c713934abeb949642d7d7331d0c4b25cb43113fa401daf4254042b28310a27165609ff1780b1917d92cdc83d9b4ebd530a716d810cac29
-
Filesize
68KB
MD5cf54118dc56610a97cd19ba6171475cc
SHA1bb6d3fb0e444651ad3d819b346e533034f3b9766
SHA256875974480ba6e9ca1e199a4030dd21b916f889e0b958c49c843887a5c2f2ef0a
SHA51273948c9bbd5369f165944217b630992f560563ef9f4c7b43fec3b4a9a5c6f12e5828e50d2b60bae9bbbe8c80aa063500a90e1c83f9c1cdf8915000d02bed5367