Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 18:29
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
random.exe
-
Size
503KB
-
MD5
8479e460fc8a0284d9af6e699a07e2c4
-
SHA1
bd6a2177d050c97afe50dfb53c50f5103c875939
-
SHA256
210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d
-
SHA512
5f41fecf65f6b36edfa285b0fd3c9ccd2e08f2520ce35d5aa14dfe2e67ffd6fabb9e776130bd4362ffe3bbb22b986614f536813e06eda9c2298bfd0b80dd531d
-
SSDEEP
12288:akN2r7eiIWbEnBnX/3PDxfw1pRlBB3mLDyyghJ:akN2veieX//D0j3OD5mJ
Malware Config
Extracted
Family
lumma
C2
https://suggestyuoz.biz/api
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 4072 2232 random.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3696 2232 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2232 wrote to memory of 4072 2232 random.exe 83 PID 2232 wrote to memory of 4072 2232 random.exe 83 PID 2232 wrote to memory of 4072 2232 random.exe 83 PID 2232 wrote to memory of 4072 2232 random.exe 83 PID 2232 wrote to memory of 4072 2232 random.exe 83 PID 2232 wrote to memory of 4072 2232 random.exe 83 PID 2232 wrote to memory of 4072 2232 random.exe 83 PID 2232 wrote to memory of 4072 2232 random.exe 83 PID 2232 wrote to memory of 4072 2232 random.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 8282⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2232 -ip 22321⤵PID:2196