Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 05:05
Static task
static1
Behavioral task
behavioral1
Sample
d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe
Resource
win7-20240729-en
General
-
Target
d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe
-
Size
5.4MB
-
MD5
6e3dc1be717861da3cd7c57e8a1e3911
-
SHA1
767e39aa9f02592d4234f38a21ea9a0e5aa66c62
-
SHA256
d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30
-
SHA512
da91742e1494c027616e114e42d3333d61eda91379f6ad2ba415dc39e0b5165a25498d60537b3cb12a49267c306dfbec87d3af528e27abc9946cd5fda6b129c1
-
SSDEEP
98304:UK/ZoaSs+bgcPlK+rSN2xeELJ4g1x3+FbdYapMDrEPxiJVwJyHLcnP6WfwCA+D://uVs+bH9K+OGeIBSHqDIPI7WOLyyWfF
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 3 IoCs
pid Process 1800 d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe 2064 msn.exe 384 msn.exe -
Loads dropped DLL 7 IoCs
pid Process 1800 d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe 2064 msn.exe 2064 msn.exe 2064 msn.exe 384 msn.exe 384 msn.exe 384 msn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 384 set thread context of 748 384 msn.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2064 msn.exe 384 msn.exe 384 msn.exe 748 cmd.exe 748 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 384 msn.exe 748 cmd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1800 2808 d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe 87 PID 2808 wrote to memory of 1800 2808 d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe 87 PID 1800 wrote to memory of 2064 1800 d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe 88 PID 1800 wrote to memory of 2064 1800 d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe 88 PID 1800 wrote to memory of 2064 1800 d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe 88 PID 2064 wrote to memory of 384 2064 msn.exe 89 PID 2064 wrote to memory of 384 2064 msn.exe 89 PID 2064 wrote to memory of 384 2064 msn.exe 89 PID 384 wrote to memory of 748 384 msn.exe 90 PID 384 wrote to memory of 748 384 msn.exe 90 PID 384 wrote to memory of 748 384 msn.exe 90 PID 384 wrote to memory of 748 384 msn.exe 90 PID 748 wrote to memory of 4468 748 cmd.exe 110 PID 748 wrote to memory of 4468 748 cmd.exe 110 PID 748 wrote to memory of 4468 748 cmd.exe 110 PID 748 wrote to memory of 4468 748 cmd.exe 110 PID 748 wrote to memory of 4468 748 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe"C:\Users\Admin\AppData\Local\Temp\d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\TEMP\{B1088C41-0710-459C-A3D6-DC2778395E28}\.cr\d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe"C:\Windows\TEMP\{B1088C41-0710-459C-A3D6-DC2778395E28}\.cr\d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe" -burn.filehandle.attached=592 -burn.filehandle.self=5962⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\TEMP\{3E3B7AAF-520D-449C-8AD0-4079DC6DECEF}\.ba\msn.exeC:\Windows\TEMP\{3E3B7AAF-520D-449C-8AD0-4079DC6DECEF}\.ba\msn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Roaming\serviceTlsv3_x86\msn.exeC:\Users\Admin\AppData\Roaming\serviceTlsv3_x86\msn.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a68b7081121648b6f267295cdebe0407
SHA124543de2f340d1cbf668854cef05cea302cc25c6
SHA2567c0b2180b08efd0af635017af7a8181776ac0790b2d811d8fb60dc25ef996eb9
SHA512bb078499d29ecafc44addde25c05abdc21ab1864661fcc7bd86263d92f62914921b727177133ff56f76ce2ee5e313e0713d0e2fdc7e23d2aa6513050d188fdb4
-
Filesize
799KB
MD5ab2b9ef9cc48c63955a738881a8ca4cc
SHA128e5484e1d3cf98d56f764eed95a437c11621a86
SHA25613177433700e91c2efaf3ec155efe30c1d53f9b5a1fd65e7931c789bf65ffb91
SHA5127678e02a465c90feaff16d4eeca8e823b5e5289ba86746323bb0323dc9381260a1501da3288c2d358fac5caef950d361256ebbf15aa22fce3b490c3f863c316e
-
Filesize
54KB
MD59982438cc8eb86ab120ef0a8241f8efc
SHA1132ed9d13d612bc11ea45bcc8b25e5536e488d08
SHA256c777b4d375643b20887e8b3dced8eb53d8dae98b94cfca4107da9f446b297e82
SHA5123e2e816f61b6cbf19556ed4d5690a04ce74b994f9fe684bf29d2ee8078f0254b7a1b905b1f01d4c59977d32b63ce9062eea7c71048851eed164e1b5d70e6abe7
-
Filesize
612KB
MD543143abb001d4211fab627c136124a44
SHA1edb99760ae04bfe68aaacf34eb0287a3c10ec885
SHA256cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03
SHA512ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6
-
Filesize
1.4MB
MD5dad4d39ac979cf5c545116b4f459e362
SHA154632d73df4ddf43ab38ed66c00989ee55569f7d
SHA256c63054e681f9acbec7e12a8ba691bc3657e3279825734517929ccd9f1e43db4d
SHA512cb81c2a457d7a65a52a0cc03161308aeaa1e39b4cdaeb16e70dfefbe79212d015674e6662bf9d0edbb95a7d4de8b33d0dfdb9da3d214e537cf557f042362811d
-
Filesize
331KB
MD554ee6a204238313dc6aca21c7e036c17
SHA1531fd1c18e2e4984c72334eb56af78a1048da6c7
SHA2560abf68b8409046a1555d48ac506fd26fda4b29d8d61e07bc412a4e21de2782fd
SHA51219a2e371712aab54b75059d39a9aea6e7de2eb69b3ffc0332e60df617ebb9de61571b2ca722cddb75c9cbc79f8200d03f73539f21f69366eae3c7641731c7820
-
Filesize
791KB
MD5ef66829b99bbfc465b05dc7411b0dcfa
SHA1c6f6275f92053b4b9fa8f2738ed3e84f45261503
SHA256257e6489f5b733f2822f0689295a9f47873be3cec5f4a135cd847a2f2c82a575
SHA5126839b7372e37e67c270a4225f91df21f856158a292849da2101c2978ce37cd08b75923ab30ca39d7360ce896fc6a2a2d646dd88eb2993cef612c43a475fdb2ea
-
Filesize
5.5MB
MD5537915708fe4e81e18e99d5104b353ed
SHA1128ddb7096e5b748c72dc13f55b593d8d20aa3fb
SHA2566dc7275f2143d1de0ca66c487b0f2ebff3d4c6a79684f03b9619bf23143ecf74
SHA5129ceaaf7aa5889be9f5606646403133782d004b9d78ef83d7007dfce67c0f4f688d7931aebc74f1fc30aac2f1dd6281bdadfb52bc3ea46aca33b334adb4067ae2
-
Filesize
982KB
MD5ac97328f67d0877e526fb6ac131bf4be
SHA19f61ffe3f3ca2463929bfea3292ffe9ca003af18
SHA256f73e3f3d3fea1a556b8a91680c13b3969136c2abdf9121604b9389bdd1fc58e9
SHA512d0ac3def81d5def886a2655d61ec6a5481157c4f0d9440df2c175725960f0e06021cd5e43705db0b864760af983d7c6e8d578f086612d0da8c28e4bcc9cfa705
-
C:\Windows\Temp\{B1088C41-0710-459C-A3D6-DC2778395E28}\.cr\d4a388cc151fa56379f9ac6ef8b7851b6750c2ecfc2c8f6904ac6002865c4f30.exe
Filesize4.8MB
MD574302d09606255cb10a7df3a744e6908
SHA1c64b9de79b68cdd0531219c8be07110caee014bc
SHA256b040fd107e566c5e4bbd3d84fc51ae33d393fd3a03b33d07772733e36a2eb25d
SHA512451c91b9b8454755c5a816f88c99b42e228ec21d4ab36938daa72e49b1490e93df6d28c53f6e3f1d97b21cb747714966c144928e141c481e10550b3c7eaea961