Analysis
-
max time kernel
8s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 23:04
Static task
static1
Behavioral task
behavioral1
Sample
Discord Checker.exe
Resource
win7-20240903-en
General
-
Target
Discord Checker.exe
-
Size
58.6MB
-
MD5
c2d496802f813fa0d09efd0b6f91b977
-
SHA1
fa4db0473ca9034169d062609e6bb9a045c6cefc
-
SHA256
415073c534042cf782c00f9ee64f765b994d243a10a9c8d56be84cc45eb8f1f1
-
SHA512
77268ea332f048d3d461d468abd66cde9e367b79cb47b8227a7cc1aec910c252b5dd77572c31baae491edc52f9da7165c30d9b373ecfb9cdb70b208ebd23abc2
-
SSDEEP
12288:Dv2YAEaMSpAmzHCr9MQfnKXynbN+e7cExX/r88/gmYFK/6i3G6L5xQrEWxAi1+HK:DW4StY9MQfnlbHXW
Malware Config
Extracted
lumma
https://celosiapatroen.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 1888 Discord Checker.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1888 set thread context of 4176 1888 Discord Checker.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord Checker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1888 wrote to memory of 4176 1888 Discord Checker.exe 84 PID 1888 wrote to memory of 4176 1888 Discord Checker.exe 84 PID 1888 wrote to memory of 4176 1888 Discord Checker.exe 84 PID 1888 wrote to memory of 4176 1888 Discord Checker.exe 84 PID 1888 wrote to memory of 4176 1888 Discord Checker.exe 84 PID 1888 wrote to memory of 4176 1888 Discord Checker.exe 84 PID 1888 wrote to memory of 4176 1888 Discord Checker.exe 84 PID 1888 wrote to memory of 4176 1888 Discord Checker.exe 84 PID 1888 wrote to memory of 4176 1888 Discord Checker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Discord Checker.exe"C:\Users\Admin\AppData\Local\Temp\Discord Checker.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
465KB
MD5d0f3c26a388a10cdb38234798c82c2d4
SHA108d6bb12a902c11f2ed2e9967ad6130cccf37a2f
SHA25662af6db6aea76de519671b868ec3b660f1215c41ffe80af103e1e11eef877f74
SHA512af131d0d0a3d3c51bbcf37757192e36745d9ff849df24a601a001e215cc26419dab8c42c1adfcb8b94a14f896be8ee38aea38571cc0139798d01ca632838adad