Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2025, 17:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
random.exe
-
Size
530KB
-
MD5
3e24b5c245488779f5e6d568a99fc0a9
-
SHA1
f7da8983de091aa10db6700631f860305e5263e5
-
SHA256
6fe08566aa76bce7b557f9d3d4501b5ca7b3cfda46188454a1199cda4d07316d
-
SHA512
909f3d5edb69d4709a95c46dd72d8fedc3c33a311ea95230ddf417b38739827cd6b416324faefafe7b8f3be2b30da0c2f4cb4041ffbfa105aa1040aad23080ab
-
SSDEEP
12288:CZkEb6EcwNbyhw+X9rKMGQkrXLfDR35dUlg:AbyhwwrTuXDDR3bUa
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1256 set thread context of 856 1256 random.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 3392 1256 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1256 wrote to memory of 856 1256 random.exe 86 PID 1256 wrote to memory of 856 1256 random.exe 86 PID 1256 wrote to memory of 856 1256 random.exe 86 PID 1256 wrote to memory of 856 1256 random.exe 86 PID 1256 wrote to memory of 856 1256 random.exe 86 PID 1256 wrote to memory of 856 1256 random.exe 86 PID 1256 wrote to memory of 856 1256 random.exe 86 PID 1256 wrote to memory of 856 1256 random.exe 86 PID 1256 wrote to memory of 856 1256 random.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"2⤵
- System Location Discovery: System Language Discovery
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 8042⤵
- Program crash
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1256 -ip 12561⤵PID:3428