Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2025, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
game.rar
Resource
win7-20241023-en
General
-
Target
game.rar
-
Size
198.7MB
-
MD5
11b59748521bf070a175100b48b3d9ca
-
SHA1
97aee524b1817f588a966678550dfef42dfa4249
-
SHA256
ab3e9253926b1d9cd7d1fcd1ba7e4af30dd0bc5744bc5e10d839026c36a0f324
-
SHA512
aa0963081325c73f1730aa848be4a3b1a5bb2cf7d5746eaea820f397e2855e37ab16b42fa00fecfda46322b0e5f7ea35db3aaf5ed572fd122821fed1fd936c62
-
SSDEEP
6291456:2+zTDyw0wl+Ln4jaIqfqvKwlnItIn+wMXPy:2UDy59nGtqf3wAInsy
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 8 IoCs
pid Process 2624 tsle.exe 3424 tsle.exe 928 tsle.exe 3056 tsle.exe 1704 tsle(x86).exe 2832 tsle(x86).exe 3552 tsle.exe 2168 tsle.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2624 set thread context of 3424 2624 tsle.exe 102 PID 928 set thread context of 3056 928 tsle.exe 119 PID 3552 set thread context of 2168 3552 tsle.exe 128 -
Program crash 3 IoCs
pid pid_target Process procid_target 4440 2624 WerFault.exe 99 536 928 WerFault.exe 118 1260 3552 WerFault.exe 127 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsle.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4568 7zFM.exe 4568 7zFM.exe 4568 7zFM.exe 4568 7zFM.exe 4568 7zFM.exe 4568 7zFM.exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 1704 tsle(x86).exe 4568 7zFM.exe 4568 7zFM.exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe 2832 tsle(x86).exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4568 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 4568 7zFM.exe Token: 35 4568 7zFM.exe Token: SeSecurityPrivilege 4568 7zFM.exe Token: SeSecurityPrivilege 4568 7zFM.exe Token: SeSecurityPrivilege 4568 7zFM.exe Token: SeSecurityPrivilege 4568 7zFM.exe Token: SeSecurityPrivilege 4568 7zFM.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4568 7zFM.exe 4568 7zFM.exe 4568 7zFM.exe 4568 7zFM.exe 4568 7zFM.exe 4568 7zFM.exe 4568 7zFM.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4568 wrote to memory of 1788 4568 7zFM.exe 94 PID 4568 wrote to memory of 1788 4568 7zFM.exe 94 PID 4568 wrote to memory of 2624 4568 7zFM.exe 99 PID 4568 wrote to memory of 2624 4568 7zFM.exe 99 PID 4568 wrote to memory of 2624 4568 7zFM.exe 99 PID 2624 wrote to memory of 3424 2624 tsle.exe 102 PID 2624 wrote to memory of 3424 2624 tsle.exe 102 PID 2624 wrote to memory of 3424 2624 tsle.exe 102 PID 2624 wrote to memory of 3424 2624 tsle.exe 102 PID 2624 wrote to memory of 3424 2624 tsle.exe 102 PID 2624 wrote to memory of 3424 2624 tsle.exe 102 PID 2624 wrote to memory of 3424 2624 tsle.exe 102 PID 2624 wrote to memory of 3424 2624 tsle.exe 102 PID 2624 wrote to memory of 3424 2624 tsle.exe 102 PID 928 wrote to memory of 3056 928 tsle.exe 119 PID 928 wrote to memory of 3056 928 tsle.exe 119 PID 928 wrote to memory of 3056 928 tsle.exe 119 PID 928 wrote to memory of 3056 928 tsle.exe 119 PID 928 wrote to memory of 3056 928 tsle.exe 119 PID 928 wrote to memory of 3056 928 tsle.exe 119 PID 928 wrote to memory of 3056 928 tsle.exe 119 PID 928 wrote to memory of 3056 928 tsle.exe 119 PID 928 wrote to memory of 3056 928 tsle.exe 119 PID 4568 wrote to memory of 1704 4568 7zFM.exe 123 PID 4568 wrote to memory of 1704 4568 7zFM.exe 123 PID 3552 wrote to memory of 2168 3552 tsle.exe 128 PID 3552 wrote to memory of 2168 3552 tsle.exe 128 PID 3552 wrote to memory of 2168 3552 tsle.exe 128 PID 3552 wrote to memory of 2168 3552 tsle.exe 128 PID 3552 wrote to memory of 2168 3552 tsle.exe 128 PID 3552 wrote to memory of 2168 3552 tsle.exe 128 PID 3552 wrote to memory of 2168 3552 tsle.exe 128 PID 3552 wrote to memory of 2168 3552 tsle.exe 128 PID 3552 wrote to memory of 2168 3552 tsle.exe 128
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\game.rar"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO8D1B91F7\IF DONT OPEN RUN (x86).txt2⤵PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8D14CBC7\tsle.exe"C:\Users\Admin\AppData\Local\Temp\7zO8D14CBC7\tsle.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\7zO8D14CBC7\tsle.exe"C:\Users\Admin\AppData\Local\Temp\7zO8D14CBC7\tsle.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 8203⤵
- Program crash
PID:4440
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8D135098\tsle(x86).exe"C:\Users\Admin\AppData\Local\Temp\7zO8D135098\tsle(x86).exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2624 -ip 26241⤵PID:4388
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1560
-
C:\Users\Admin\Downloads\tsle.exe"C:\Users\Admin\Downloads\tsle.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\Downloads\tsle.exe"C:\Users\Admin\Downloads\tsle.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 8322⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 928 -ip 9281⤵PID:5028
-
C:\Users\Admin\Downloads\tsle(x86).exe"C:\Users\Admin\Downloads\tsle(x86).exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
C:\Users\Admin\Downloads\tsle.exe"C:\Users\Admin\Downloads\tsle.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\Downloads\tsle.exe"C:\Users\Admin\Downloads\tsle.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 9682⤵
- Program crash
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3552 -ip 35521⤵PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41.7MB
MD5ed14e465cf65c2ed2805223530b0f63a
SHA18b969c0fd59d26286c1d8898decdf266c0614f2b
SHA256c7c4533e373f502f4c9cd31cca48d02a139d1b1232c01bb1dd3ae2647a9665c3
SHA512c691197836fbf9b7a630352e8a7ad9fd3bf5bdc01cbe26e1f9180dac0935ea315767ebc11bcb7e9d8c0ba3944aa1b9ad55b85ac46f9d0f86d7837da65f350426
-
Filesize
541KB
MD57d8a0d2e54da21c54701e5f67bb45475
SHA16570e736ed9e6e6e50cc836eed064b3e2fe63677
SHA256b8d9e07c66769c5d5474d51f5748cc285096f3041a4caca0c90069bc0d7cf4c2
SHA5127138aae99f74b3855b525087aa6cf580685da36438e6c3c78805924ee5d583b53abd56d65fd9ab6e76a4796911f53db59fb3a1067685cb29ff2f0b1192c3e6b8