Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2025, 06:16
General
-
Target
Captiva.exe
-
Size
7.0MB
-
MD5
8b7343c22fb99c26da8f3122c6cecdcd
-
SHA1
898ebaa6ae8293f24306475ea5029520a1533dbc
-
SHA256
fd37270bdce8937cc3cb0d4d99300f537daba57e70f36f40e4c767411f7938cd
-
SHA512
8d806c124656ebdf151f92ce9bb6024cb2fe17a5dafeb90c0ceff783c6e8c9044f00bc846727465f64f79946096d60d81d2434ae6cb05b6a18aee5bc05e4ba81
-
SSDEEP
98304:c3d8QkJDJ3m0R1yQXvCyCE28yW1cadMykTmERn50gxIbgSZtwzn05A4tcqQVIhvQ:p+0ncq/aDDWqR
Malware Config
Extracted
lumma
https://uprootquincju.shop/api
Signatures
-
Lumma family
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Captiva.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 2956 Captiva.exe 2956 Captiva.exe 2956 Captiva.exe 2956 Captiva.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 384 taskmgr.exe Token: SeSystemProfilePrivilege 384 taskmgr.exe Token: SeCreateGlobalPrivilege 384 taskmgr.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe 384 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Captiva.exe"C:\Users\Admin\AppData\Local\Temp\Captiva.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:384
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3