Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 16:28
Static task
static1
Behavioral task
behavioral1
Sample
RayzMod V3/Extreme.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RayzMod V3/Extreme.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RayzMod V3/RayzMod V3.exe
Resource
win7-20240903-en
General
-
Target
RayzMod V3/RayzMod V3.exe
-
Size
2.3MB
-
MD5
ed2115c1b861e6cf53f71e1f1cd8e38d
-
SHA1
70ba2796950f95f0ffddaf35cfd3174fd764da78
-
SHA256
eb969f9065d25218d4ffc9f9613aa4bc96e13e970a3d53e26cc86cd10fe4675b
-
SHA512
319cec7633e77769fafdce8300809638039f70173db2d1eba8120b0d69054787086779bfa5b336eb2b3dc8d32e19d2b96b30643eaeeb187a69fcc7ac88363a7f
-
SSDEEP
49152:Z4mr7qCybpPo/kGRcNjkRSpbp3/CI5P76:Z7P3ybxocGRUjkEH5
Malware Config
Extracted
lumma
https://demonstationfukewko.shop/api
https://liabilitynighstjsko.shop/api
https://alcojoldwograpciw.shop/api
https://incredibleextedwj.shop/api
https://shortsvelventysjo.shop/api
https://shatterbreathepsw.shop/api
https://tolerateilusidjukl.shop/api
https://productivelookewr.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 4380 RayzMod V3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4380 set thread context of 1948 4380 RayzMod V3.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RayzMod V3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1948 4380 RayzMod V3.exe 84 PID 4380 wrote to memory of 1948 4380 RayzMod V3.exe 84 PID 4380 wrote to memory of 1948 4380 RayzMod V3.exe 84 PID 4380 wrote to memory of 1948 4380 RayzMod V3.exe 84 PID 4380 wrote to memory of 1948 4380 RayzMod V3.exe 84 PID 4380 wrote to memory of 1948 4380 RayzMod V3.exe 84 PID 4380 wrote to memory of 1948 4380 RayzMod V3.exe 84 PID 4380 wrote to memory of 1948 4380 RayzMod V3.exe 84 PID 4380 wrote to memory of 1948 4380 RayzMod V3.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\RayzMod V3\RayzMod V3.exe"C:\Users\Admin\AppData\Local\Temp\RayzMod V3\RayzMod V3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD512394bd8d360741e327c565da237fcb5
SHA1fa2c9e1d3e3fc7eb21d00ff137154cd9ed9cc89c
SHA256d315e1534c71d822a07021629298aa06c17d301f93512e430d24022456e70689
SHA51291cc10eff3d85e4e1d2090a729f33ad1d7845516553a2ab0f727c795522c2726c48b039d1dff3c3b771c4c7e03ebe6bdcd28ff05eb677d9476703cf235020be9