Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-01-2025 21:21
Static task
static1
General
-
Target
stage4_inmemory.exe
-
Size
1.2MB
-
MD5
8e8280ed88a5435880a63873367b2fc9
-
SHA1
45bd86a0c42647a66e164e564abfc4b43ad4243b
-
SHA256
af86b32a933800cf30edb4f8f40cddd74253f599eb3edc8aa643fdfd30621f0b
-
SHA512
d0d11b59a22f9298c82834c25be137f740e82c91f327f4c883d38bc63caa61c4afbb69a2b0bc76be60201cf69c5e97fbb9b50c9ae745debf741284405efe4218
-
SSDEEP
24576:+cWEAED8iMPtLVSLRw4ngZDEtvFAK4xwheL57FpbQLYffegKWz2NbGN7Tig:r8Jt4LRfIEtvFJhheL55pbQkffegCNC
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://carveforutune.click/api
Signatures
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4852 created 3272 4852 stage4_inmemory.exe 52 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/4852-1-0x0000000000F50000-0x0000000001092000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4852 set thread context of 4860 4852 stage4_inmemory.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stage4_inmemory.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stage4_inmemory.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4852 stage4_inmemory.exe 4852 stage4_inmemory.exe 4852 stage4_inmemory.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4852 stage4_inmemory.exe Token: SeDebugPrivilege 4852 stage4_inmemory.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77 PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77 PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77 PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77 PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77 PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77 PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77 PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77 PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77 PID 4852 wrote to memory of 4860 4852 stage4_inmemory.exe 77
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\stage4_inmemory.exe"C:\Users\Admin\AppData\Local\Temp\stage4_inmemory.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\stage4_inmemory.exe"C:\Users\Admin\AppData\Local\Temp\stage4_inmemory.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4860
-