Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2025, 11:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Driver.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Driver.exe
-
Size
553KB
-
MD5
3fb5f0132baacf13507f5d0643b7d38c
-
SHA1
4ab14ea21bc2e37886da29a22300dd529e1d3593
-
SHA256
95610c880eabc595189e850fdd06bc1cd1c15dd7fa6b75426852a080571e8385
-
SHA512
3d76978804ea63525b9ca0924116b4a6613ad310459600f3f0858eceda859752b4ff42f384f17bd07c5f54e50da6a7d804abd736fc13428fd8d4d49631829175
-
SSDEEP
12288:+Y6R+JQXjAnN3ykQO4LJ0uPNvW8zEXDXE4PyCLBCzd+yInzUy:uTARQOSJ0ukbD0wCzdeb
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5052 set thread context of 4796 5052 Driver.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 784 5052 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Driver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Driver.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2392 5052 Driver.exe 83 PID 5052 wrote to memory of 2392 5052 Driver.exe 83 PID 5052 wrote to memory of 2392 5052 Driver.exe 83 PID 5052 wrote to memory of 4796 5052 Driver.exe 84 PID 5052 wrote to memory of 4796 5052 Driver.exe 84 PID 5052 wrote to memory of 4796 5052 Driver.exe 84 PID 5052 wrote to memory of 4796 5052 Driver.exe 84 PID 5052 wrote to memory of 4796 5052 Driver.exe 84 PID 5052 wrote to memory of 4796 5052 Driver.exe 84 PID 5052 wrote to memory of 4796 5052 Driver.exe 84 PID 5052 wrote to memory of 4796 5052 Driver.exe 84 PID 5052 wrote to memory of 4796 5052 Driver.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Driver.exe"C:\Users\Admin\AppData\Local\Temp\Driver.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\Driver.exe"C:\Users\Admin\AppData\Local\Temp\Driver.exe"2⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\Driver.exe"C:\Users\Admin\AppData\Local\Temp\Driver.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 8362⤵
- Program crash
PID:784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5052 -ip 50521⤵PID:3508