Analysis
-
max time kernel
91s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 17:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
random.exe
-
Size
358KB
-
MD5
92bf5eeea4fc551ed2d5090a3061704d
-
SHA1
e3d11cce21d1ecb7457f583539f5e92a54271bad
-
SHA256
84b2ae5fc55b2394ffc16022d5dce9b11fb232f14ccedf0cde7b6af44d0c5bc9
-
SHA512
47b156c503ebe5844bf712b431733f45f9e27797bb929f00293536d8c152a005638aade8a8cf386ca7fcdc1177755ca36aa46754d189daecd093009ad2a9dea6
-
SSDEEP
6144:TyJN9fUcPi6NViFY1mIHYH2bOVOWX74DscbbQHzm5ZO0zg8lMSKkbgbTjXx7x:2JN9JPi6a4mIG2yVlLKPb+zm5ZzOSL23
Malware Config
Extracted
Family
lumma
C2
https://wordemnyauop.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3180 set thread context of 4008 3180 random.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 2428 3180 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4008 3180 random.exe 85 PID 3180 wrote to memory of 4008 3180 random.exe 85 PID 3180 wrote to memory of 4008 3180 random.exe 85 PID 3180 wrote to memory of 4008 3180 random.exe 85 PID 3180 wrote to memory of 4008 3180 random.exe 85 PID 3180 wrote to memory of 4008 3180 random.exe 85 PID 3180 wrote to memory of 4008 3180 random.exe 85 PID 3180 wrote to memory of 4008 3180 random.exe 85 PID 3180 wrote to memory of 4008 3180 random.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 2402⤵
- Program crash
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3180 -ip 31801⤵PID:3276