Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 18:42
Static task
static1
Behavioral task
behavioral1
Sample
r6_internal_free_cheat.rar.exe
Resource
win7-20240903-en
General
-
Target
r6_internal_free_cheat.rar.exe
-
Size
852.2MB
-
MD5
37d8c5974a5f387bd89405fdd1aea581
-
SHA1
1e498afbfaf4f79b34ef900273ffadc300f50f1a
-
SHA256
e5cd8af4c7685c5427354054de735f971df3e8eba9e9352844beeeb21c3bfee8
-
SHA512
4785bd5fb83bc0cdb555e597a35e8787ad9fbe96b79bbc181ac059404cd7423eaec3943e8d49a24421aeecd14d87625c50ac111fa214be510689c31447d00fc0
-
SSDEEP
393216:mCMAUBGCDgY9yJUzqsQXh7b3ii/YC2E3SeLsl8vgSy6:mnbByYmT7308V
Malware Config
Extracted
lumma
https://comptetscant.shop/api
Signatures
-
Lumma family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation r6_internal_free_cheat.rar.exe -
Executes dropped EXE 1 IoCs
pid Process 3616 Missile.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3300 tasklist.exe 2876 tasklist.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\ValidVillas r6_internal_free_cheat.rar.exe File opened for modification C:\Windows\SauceCompany r6_internal_free_cheat.rar.exe File opened for modification C:\Windows\InflationMichigan r6_internal_free_cheat.rar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r6_internal_free_cheat.rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Missile.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3616 Missile.com 3616 Missile.com 3616 Missile.com 3616 Missile.com 3616 Missile.com 3616 Missile.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3300 tasklist.exe Token: SeDebugPrivilege 2876 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3616 Missile.com 3616 Missile.com 3616 Missile.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3616 Missile.com 3616 Missile.com 3616 Missile.com -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4056 wrote to memory of 3360 4056 r6_internal_free_cheat.rar.exe 83 PID 4056 wrote to memory of 3360 4056 r6_internal_free_cheat.rar.exe 83 PID 4056 wrote to memory of 3360 4056 r6_internal_free_cheat.rar.exe 83 PID 3360 wrote to memory of 3300 3360 cmd.exe 85 PID 3360 wrote to memory of 3300 3360 cmd.exe 85 PID 3360 wrote to memory of 3300 3360 cmd.exe 85 PID 3360 wrote to memory of 2928 3360 cmd.exe 86 PID 3360 wrote to memory of 2928 3360 cmd.exe 86 PID 3360 wrote to memory of 2928 3360 cmd.exe 86 PID 3360 wrote to memory of 2876 3360 cmd.exe 89 PID 3360 wrote to memory of 2876 3360 cmd.exe 89 PID 3360 wrote to memory of 2876 3360 cmd.exe 89 PID 3360 wrote to memory of 1360 3360 cmd.exe 90 PID 3360 wrote to memory of 1360 3360 cmd.exe 90 PID 3360 wrote to memory of 1360 3360 cmd.exe 90 PID 3360 wrote to memory of 1868 3360 cmd.exe 91 PID 3360 wrote to memory of 1868 3360 cmd.exe 91 PID 3360 wrote to memory of 1868 3360 cmd.exe 91 PID 3360 wrote to memory of 3120 3360 cmd.exe 92 PID 3360 wrote to memory of 3120 3360 cmd.exe 92 PID 3360 wrote to memory of 3120 3360 cmd.exe 92 PID 3360 wrote to memory of 4168 3360 cmd.exe 93 PID 3360 wrote to memory of 4168 3360 cmd.exe 93 PID 3360 wrote to memory of 4168 3360 cmd.exe 93 PID 3360 wrote to memory of 4468 3360 cmd.exe 94 PID 3360 wrote to memory of 4468 3360 cmd.exe 94 PID 3360 wrote to memory of 4468 3360 cmd.exe 94 PID 3360 wrote to memory of 2380 3360 cmd.exe 95 PID 3360 wrote to memory of 2380 3360 cmd.exe 95 PID 3360 wrote to memory of 2380 3360 cmd.exe 95 PID 3360 wrote to memory of 3616 3360 cmd.exe 96 PID 3360 wrote to memory of 3616 3360 cmd.exe 96 PID 3360 wrote to memory of 3616 3360 cmd.exe 96 PID 3360 wrote to memory of 1612 3360 cmd.exe 97 PID 3360 wrote to memory of 1612 3360 cmd.exe 97 PID 3360 wrote to memory of 1612 3360 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\r6_internal_free_cheat.rar.exe"C:\Users\Admin\AppData\Local\Temp\r6_internal_free_cheat.rar.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Jvc Jvc.cmd & Jvc.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:1360
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7429923⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Gm3⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Aw" Ultram3⤵
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 742992\Missile.com + Applies + Filled + Accent + Deviation + Guns + Brave + Netscape + Officers + Storage 742992\Missile.com3⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Regional + ..\Minor + ..\Either + ..\Refugees + ..\Gothic + ..\Utils u3⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\742992\Missile.comMissile.com u3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3616
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD5bdd240fde36ab67dacba20c0ac60e497
SHA1ea2709a11e13a59df202c7c24b1e809819281a46
SHA256268d75c78fc36195c232d3d51460bde0dc7781acee37408e81c50b73a3d0083e
SHA512bbb28a3485630943d774d6351bba0d6dee559e05c997ae5fd1beea5dde5fd73a7a6a4b4b0ac379745d6cf35f6735be2ec3374ad4a3150d08602b631b16e4d9c1
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
475KB
MD5ca5912c9ec5f05cdb1c5b69a3e1cc9e9
SHA1c2497dffcfe06e066fa2e6dc935cf5892120711d
SHA256670413128488eb212d6070f4539a0734c23127a02ed3dd9d99df48dc12e128de
SHA512d36212b1f7fff8a926b0be6823950f9df865d64e6e7c53d22d84c8b8b5c55c8fb8c12ceab331af42876ae5f4923c97c2ccae5426d5163864690a096c69337237
-
Filesize
128KB
MD5cdc4850983aa0c38e38bd1c5ea3c0a8c
SHA128774132652ad30ab99b5ebbe14453aa00ecac9e
SHA256e243e4f12d12f2bee82e1d118b7c2a540fe701cf7c14c098e31fde5d76780c82
SHA51295806983eca623d31c4a468389cc0e71a06b53cba204193fd61c5e311defff91d17b03da557e0da8a4abe4ca46ef579be5302e7f71674f8d910ec21140648f04
-
Filesize
113KB
MD522e4cc4b4e6a01a435ef2b2cf9d4ae2e
SHA15dd27b653213d24f5801f88090b713dd9a5ff96e
SHA256f942b79a29bd76f0d6e66708b89b6db461d92a5eae6ea4555c220ef7b069a3d4
SHA512f3853b529f28f46ad73b03f7e1bfb366738bf5516e87088880dfeb4db937d8f9e428da41bbd8a9f19ba3948d8b91c589e347ea5a94ba7cf0aae5460d3321a2f4
-
Filesize
85KB
MD5f9a5e51274730ff6f68bebf32bd37e77
SHA1c4e98237e94799fadb54d56b9d95ddbfb9896cc7
SHA256351d2cee1ad25d0ea8b5e7f153e266d21787084ac38126211f281c6b5c84fb7e
SHA5123eb9bc8f27cd906c7e15e306ee6f0e8d9f4bf47351f2409cdf2930714b45610bdc6a96c68bd03e0ee1a7f4919caf431308872b8b77358abfdb4ed47eb51e236b
-
Filesize
129KB
MD5e928c41942564cb8913765841cf04f25
SHA1294f75238366bb5cd3b1cc0b8e7f0f4e0ac98f7e
SHA2569ca24270c94d4abb65109a3d66c8df25a6e257ffb88947f7e0ffca75b44e8e78
SHA512c3c39938061f6083256677e9b7cd3f9d73a17788e5ef01bea351ede9d4025934b5b84464da921795a2c4d8e5afc2d5383a5fe45fbfb7599c144cbdaf934a0fa6
-
Filesize
94KB
MD5462e0c19616536badc14cbc5bb5c30d7
SHA14236297c3d315691863d61174a81592128b76971
SHA256a5fe1ad9a4e2ccc4ec5d96941e1035b243019ff449849c6f4a306c94645ca398
SHA5120bb23b2a4eed1fd7dd871786b05fa376ee3a7659c8b6b7e4239de20b7ea11ee9a682b1ad2ee015cad47867ce38d2b44b4f8d8b4beb867494fe5941105edea8e0
-
Filesize
88KB
MD51a17a767dcbbd6a9d0540b76d36480da
SHA133e9c3e951f29bc975b34a1beae43f7c9a15ca4a
SHA256c9a746e21586b11d8c7c966fb36d5e6b23b787167aa718a8029d2dfa983d740f
SHA512c9325950991a3ac18466f49979b8262aea6203e30070c9957ff3e5cf397551111e5abda02a31efa7f010a5ca3969f89a42c7d32a4bd34f7319e4d0f7c51805ca
-
Filesize
476KB
MD51e33dd4b10e760ab7758ced44e22bcef
SHA1d2bd3c81a2448c2da09cf172d492f6023b39e6b7
SHA256a911577dd3b05350be00d1d42f73c506ca4303084e633583503b22b712b69bd1
SHA512e7b71bc86c55c7d192f2652a74d67ee475c4e9321962ae17d1b131bd1e4c350b427f8bbcec9549400882cc71a6cb4779920450080657d564fbf23f4183d19712
-
Filesize
71KB
MD579bfa125d6c8994f029dfac6b7affc3d
SHA1b00b2b53a1a8e2cceb8f6385957ab9c30ba1a7ab
SHA256877e2754e58b69df37884908bfd4d141505728f0f5bf1a7ec29fe41bcf042f3d
SHA5125f079a5802b579632abe5a758fab6772cec32bdd57bcc0255cbadf31075616f978f1b2319194bbf6fc35aad9c8feb4e5ebcf6f15bdbda801190c7461cb8a22b9
-
Filesize
120KB
MD5a64f415e1ee063001fbf173ff04051d4
SHA1885ff1a8a83b684e47afd282f940eabf39261898
SHA256e59a4c866d2c324e469321735cc7563cb7e4b1b8d81c67250d6391da760d0dc2
SHA512923a4521e3733c5cfdbbc9473cdfe33a4a856d309f6e4834dc9403aabc3c951d166a89d7b883c4e2e74221919e54622a7d0e22405576e0e7e199af50ba4d83d0
-
Filesize
9KB
MD538acf58cb648e0df461ca4d4f4dbe0ed
SHA1557c12a43d9ddc14b724a1eb08e5476839faf8a4
SHA2564709a400319e403f43e5208194bce529bbc190c0fd77586a5bd9674f56b20ad1
SHA512aea50d82dcabc72407776f9780eb9856b94b0184be3c8a7d71d574497c03f6d4de0f33f397936f3ee7f97c263c452ae9a81b9bfa5d9ccee2c96e91e302f1385d
-
Filesize
63KB
MD52dae3f1e78cdea1f6c70a2ba347f3657
SHA1f6ca1370aeb039fab7d5e43e5d817f2e375cbc6a
SHA256b5222bbb5366a12d8bc15cf7f0b45844259382b7a80178b2bbd0dedc63cc0fe2
SHA51289dbf47a2803c5bcb7bbee788332eb71141b152b945b18f17579f2da05e95cf8cc1087d90a53ab7738150cf45920db68329c29469e80bf394b35e98b8d7cf852
-
Filesize
91KB
MD55d7a031f30a220bebb6bf82c62ebfb45
SHA1212ca7de87df0cc711837f5961da5d47fd481012
SHA25623706fca324d201f4e8fbf2a3f1754c701f6701a97beff4aa56869e859cb82b0
SHA5128e7143989b84e55db806af72e907d1cdca964be17b37800632eb7b92a3030ef2bb499a101d3b877e58d9abffb0e7743b73b1be963e7c8289817048e8785b2897
-
Filesize
89KB
MD53ce9ccd550f8f45cff0c215db2098671
SHA15e5f73092fc2ea47714239ad51b6695b7c6ae96b
SHA25625ece6848b6432d06f6317f9ce2e8c58f988e0abf78f921e9b43ad74f34e19d9
SHA51243988c0dc4bf6f0454265b1e4895598a0758919da092fe5ca19e4d333f0919c28722df03f0282ad6754e479659fa0583e3108e35341383c879613fe611a7cfcd
-
Filesize
76KB
MD5aeeeabf1b1f7699078d8b3bf2de64ca8
SHA15a8cc592d28b6dc2f414dd220d146455028f6fe8
SHA2568aacc1ffad00e2d7a3b1a70891d5efb47e5a7d247cef0666f96b50bd792eab15
SHA512495ac1b2ea9de7d5cfb582de0ae458dcc73883575ee3d38b6fe7e733b92946fb74b612d9e91634ee676fa6156f2416a33c9412866ac1be9e07a26809a71fff67
-
Filesize
89KB
MD52031feb788b18c63453d160451b0e2cf
SHA13ad74b8097f6307efb0e2cdbd0efcc5056fd07a6
SHA2569fd341a6409e50e7c0ca0df98135928d2f0d24626554495e33b2489bb217d41d
SHA51216835172111ff5c17bbf3a03aa49e8fc78459668514f9f839c305ccaa7bfd38d5742189a136b94be41f4300d3b1b0d52cd41a16e1323ad2f56c1d8e037f4fba2
-
Filesize
81KB
MD5c16c4a01b74e68c0ed8cce567a2361d7
SHA1dd522f5e2a33df224a3c9eed9adc3d50e7dd0666
SHA256c59ff8a06ce249a5992d01edfe7d675ccfc910d2e24bbf9c90e757be9ede6d4b
SHA512f9bead2403a82f44ae87759e8b93d93fee3fe9eec64b8b33146d2df988df05d0d22ca6430076044fb534b836768b558d61853a8c60db5252fc3141978248a0e5
-
Filesize
138B
MD59eb5a2793730043e1fea41f26f220e98
SHA16ac96560288d3f2f5256a2db398e2dd3c9c05f69
SHA256fd3e46043fd1345b70c3fe5044c0231ca740ab4f6c255d4ddc0d8da9efb3825d
SHA512c68317506a1a6d7bc35a0a0f95e1c5747323387c616e4e27f19170a3671e398883805036671e7f0d2a1918ccab26d3c520ab83d502d8f907820279c39e13a586
-
Filesize
82KB
MD5a7428a8558f5cc5d1e0234b429fffc33
SHA1975dd3dc4317ddde6275fc40485524ef7b141424
SHA256920b54733eec251b06b15a94c425a800edbde3f6f05a34fff8e7af471a9ec1a6
SHA5129c404d556464a417372e1ddfa73d6fa3712f07a1ec8a08ba4a2a4f5a2de2d5033574bddcd526a910a2acc0c01a90f00275b0dd53fc3dacfb09fa9f0619670fc9