Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2025, 13:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
random.exe
-
Size
9.8MB
-
MD5
db3632ef37d9e27dfa2fd76f320540ca
-
SHA1
f894b26a6910e1eb53b1891c651754a2b28ddd86
-
SHA256
0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
-
SHA512
4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
SSDEEP
98304:IWlC18CzkF6kJdZi/lBMoo6Yc3A2o5APDm5:PlW1BMoOED
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3636 set thread context of 4504 3636 random.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3636 wrote to memory of 4504 3636 random.exe 100 PID 3636 wrote to memory of 4504 3636 random.exe 100 PID 3636 wrote to memory of 4504 3636 random.exe 100 PID 3636 wrote to memory of 4504 3636 random.exe 100 PID 3636 wrote to memory of 4504 3636 random.exe 100 PID 3636 wrote to memory of 4504 3636 random.exe 100 PID 3636 wrote to memory of 4504 3636 random.exe 100 PID 3636 wrote to memory of 4504 3636 random.exe 100 PID 3636 wrote to memory of 4504 3636 random.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4504
-