Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 04:12
Static task
static1
Behavioral task
behavioral1
Sample
210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe
Resource
win7-20240903-en
General
-
Target
210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe
-
Size
503KB
-
MD5
8479e460fc8a0284d9af6e699a07e2c4
-
SHA1
bd6a2177d050c97afe50dfb53c50f5103c875939
-
SHA256
210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d
-
SHA512
5f41fecf65f6b36edfa285b0fd3c9ccd2e08f2520ce35d5aa14dfe2e67ffd6fabb9e776130bd4362ffe3bbb22b986614f536813e06eda9c2298bfd0b80dd531d
-
SSDEEP
12288:akN2r7eiIWbEnBnX/3PDxfw1pRlBB3mLDyyghJ:akN2veieX//D0j3OD5mJ
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3556 set thread context of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 2596 3556 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3556 wrote to memory of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82 PID 3556 wrote to memory of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82 PID 3556 wrote to memory of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82 PID 3556 wrote to memory of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82 PID 3556 wrote to memory of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82 PID 3556 wrote to memory of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82 PID 3556 wrote to memory of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82 PID 3556 wrote to memory of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82 PID 3556 wrote to memory of 5064 3556 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe"C:\Users\Admin\AppData\Local\Temp\210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe"C:\Users\Admin\AppData\Local\Temp\210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 8042⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3556 -ip 35561⤵PID:4016