Analysis
-
max time kernel
28s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 15:55
Static task
static1
Behavioral task
behavioral1
Sample
New [V2.2.0].exe
Resource
win7-20240729-en
General
-
Target
New [V2.2.0].exe
-
Size
1.9MB
-
MD5
b5a8a0f69da7208e7631a1d538b545e7
-
SHA1
d93bb0bc1a05a878553f4d7d9269eae6d472b083
-
SHA256
b8672a6d934da36f8b70f14fd76ff9b7a9eafd33d0e5fbc05c67d1912b383da7
-
SHA512
a1cc92f9b749cecfd121f2b65a1216e46b30e8525b5aa44820e73fd005fb24b01b6bea1270ec4ddb48a54321f2f7e89d6e580da54159976c7b8f5001c4953e3c
-
SSDEEP
24576:3r9p03uiOW8AMF5fTYdZRBxiid9RtUxpLZiouS5yUjx7l+PO3cV6kE:3rLdbQrB9A7LZYPU/la6j
Malware Config
Extracted
lumma
https://uprootquincju.shop/api
Signatures
-
Lumma family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New [V2.2.0].exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4624 New [V2.2.0].exe 4624 New [V2.2.0].exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4564 taskmgr.exe Token: SeSystemProfilePrivilege 4564 taskmgr.exe Token: SeCreateGlobalPrivilege 4564 taskmgr.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe 4564 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New [V2.2.0].exe"C:\Users\Admin\AppData\Local\Temp\New [V2.2.0].exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4564