Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
malware.exe
Resource
win7-20240903-en
General
-
Target
malware.exe
-
Size
7.2MB
-
MD5
d165b333fe9244a43967bc69c0b686cc
-
SHA1
58fbba484bdeeb020cc69a78218c897d28f7e2f2
-
SHA256
01a2bb9f7591986b6eb3388699e7ce4a52b2686295b48dae0ec001639ba9f9b4
-
SHA512
616556797aaad5deb2d5e8e8a70427d4e0b9ca4f64dd5976cdeaa3c6d8a37a612011e89b120a6ef2e1ef8a50d70483a71d8289a09952f612a9023d5f2922b580
-
SSDEEP
98304:sFMd0y7xmvwcd7c98l9jhbBcORNfIM/Ky:sFMd0yxOwcx3jhbBZRFIot
Malware Config
Extracted
lumma
https://associationokeo.shop/api
https://turkeyunlikelyofw.shop/api
https://detectordiscusser.shop/api
https://technologyenterdo.shop/api
https://fieldtrollyeowskwe.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 3440 malware.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3440 set thread context of 3968 3440 malware.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malware.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3968 3440 malware.exe 95 PID 3440 wrote to memory of 3968 3440 malware.exe 95 PID 3440 wrote to memory of 3968 3440 malware.exe 95 PID 3440 wrote to memory of 3968 3440 malware.exe 95 PID 3440 wrote to memory of 3968 3440 malware.exe 95 PID 3440 wrote to memory of 3968 3440 malware.exe 95 PID 3440 wrote to memory of 3968 3440 malware.exe 95 PID 3440 wrote to memory of 3968 3440 malware.exe 95 PID 3440 wrote to memory of 3968 3440 malware.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware.exe"C:\Users\Admin\AppData\Local\Temp\malware.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
- System Location Discovery: System Language Discovery
PID:3968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719