Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 04:40
Static task
static1
Behavioral task
behavioral1
Sample
9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe
Resource
win7-20240903-en
General
-
Target
9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe
-
Size
341KB
-
MD5
ce015daac1dc613cabd733e4b34da9da
-
SHA1
d0aff1ab9deb612c3c421af69c539815144e965c
-
SHA256
9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04
-
SHA512
dff780309c4449d3f81f3580a5acde573ba11eb4d120604994a880a016a9a3a00d32cf36f58946c940b0dec0c03d6d6544e6c78e70f71a38e076841053df953c
-
SSDEEP
6144:AT1Bgj04zLS/70E7IodJ6vsVzsooEAPmIV49g2/GzrtXAlGSwxj76f:Gb45zA7Fv6vsVOzm9t/Gzr9AsNP6f
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4456 set thread context of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 4784 4456 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4456 wrote to memory of 2268 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 83 PID 4456 wrote to memory of 2268 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 83 PID 4456 wrote to memory of 2268 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 83 PID 4456 wrote to memory of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84 PID 4456 wrote to memory of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84 PID 4456 wrote to memory of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84 PID 4456 wrote to memory of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84 PID 4456 wrote to memory of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84 PID 4456 wrote to memory of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84 PID 4456 wrote to memory of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84 PID 4456 wrote to memory of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84 PID 4456 wrote to memory of 3584 4456 9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe"C:\Users\Admin\AppData\Local\Temp\9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe"C:\Users\Admin\AppData\Local\Temp\9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe"2⤵PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe"C:\Users\Admin\AppData\Local\Temp\9379a83018a3ac13ad0224b0576027c85b70b4a6a1cf7c94abda18ad2b27ca04.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 7762⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4456 -ip 44561⤵PID:3080