Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2025, 08:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Testprog.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Testprog.exe
-
Size
533KB
-
MD5
aac53d8ae11403008d421c19e26c6f9d
-
SHA1
59fcb6dcd8a7b22cfe7ead3ce6a4b1c0a814e898
-
SHA256
d9fb6347296a7dbfda6be3ced9d12b72940d46347090bb10a462a825427029fe
-
SHA512
6cd812634eafbecd62dfd26556c062b03746da4b06fbf2fa1c90a4c104e6761373fd7a2b66a0fe87cba66ef57169d52a7142bfc9ec50a457b776f82b795ad09b
-
SSDEEP
12288:6ZkEb6EcwNbyWHU25vmVmriUKmbV6QWMm2m7e3YChwNuQp6ML2:obyiU2NmVmrRLxaJ2mioIwQQpNL2
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 428 set thread context of 4220 428 Testprog.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 2780 428 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Testprog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Testprog.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 428 wrote to memory of 4220 428 Testprog.exe 84 PID 428 wrote to memory of 4220 428 Testprog.exe 84 PID 428 wrote to memory of 4220 428 Testprog.exe 84 PID 428 wrote to memory of 4220 428 Testprog.exe 84 PID 428 wrote to memory of 4220 428 Testprog.exe 84 PID 428 wrote to memory of 4220 428 Testprog.exe 84 PID 428 wrote to memory of 4220 428 Testprog.exe 84 PID 428 wrote to memory of 4220 428 Testprog.exe 84 PID 428 wrote to memory of 4220 428 Testprog.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Testprog.exe"C:\Users\Admin\AppData\Local\Temp\Testprog.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\Testprog.exe"C:\Users\Admin\AppData\Local\Temp\Testprog.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 8162⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 428 -ip 4281⤵PID:916