Analysis
-
max time kernel
145s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-es -
resource tags
arch:x64arch:x86image:win10v2004-20250217-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
05/03/2025, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
ebn banco.exe
Resource
win7-20241023-es
General
-
Target
ebn banco.exe
-
Size
784.4MB
-
MD5
bdf2aa6823c193d8e1bc95f152cc28ab
-
SHA1
3f10e54411029ff7b4b32440cbd9414bbbd831c4
-
SHA256
79cfaf5728e4296f69963eb5fe954914323d86a81fe8bcabfd3b67b5a3fc1032
-
SHA512
76b37dbd007b2da721414e7a7facea65b910fd18277c2d34f9a5af44efa8c3ea989c567b03c09c486790dfacd5ca85293d8bc4fb0dd67a76d9bc4040f93cb0b8
-
SSDEEP
393216:iVAMZgKqBeEkPEgTPi1ps/zG73h/udI3Ke4tAqYft90SZd+cPO/oj:G33YptIAT4o
Malware Config
Extracted
lumma
https://theorxhysics.shop/api
Signatures
-
Lumma family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation ebn banco.exe -
Executes dropped EXE 1 IoCs
pid Process 5000 Equipped.com -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1468 tasklist.exe 468 tasklist.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\CottagesFountain ebn banco.exe File opened for modification C:\Windows\MandatoryThrow ebn banco.exe File opened for modification C:\Windows\KathyConst ebn banco.exe File opened for modification C:\Windows\MpegsExperiencing ebn banco.exe File opened for modification C:\Windows\ChileSimulation ebn banco.exe File opened for modification C:\Windows\ElectricitySoldiers ebn banco.exe File opened for modification C:\Windows\MattressFlow ebn banco.exe File opened for modification C:\Windows\DisclaimersLaughing ebn banco.exe File opened for modification C:\Windows\SystematicWizard ebn banco.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebn banco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Equipped.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1468 tasklist.exe Token: SeDebugPrivilege 468 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5000 Equipped.com 5000 Equipped.com 5000 Equipped.com -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2924 wrote to memory of 880 2924 ebn banco.exe 89 PID 2924 wrote to memory of 880 2924 ebn banco.exe 89 PID 2924 wrote to memory of 880 2924 ebn banco.exe 89 PID 880 wrote to memory of 1928 880 cmd.exe 91 PID 880 wrote to memory of 1928 880 cmd.exe 91 PID 880 wrote to memory of 1928 880 cmd.exe 91 PID 880 wrote to memory of 1468 880 cmd.exe 93 PID 880 wrote to memory of 1468 880 cmd.exe 93 PID 880 wrote to memory of 1468 880 cmd.exe 93 PID 880 wrote to memory of 3328 880 cmd.exe 94 PID 880 wrote to memory of 3328 880 cmd.exe 94 PID 880 wrote to memory of 3328 880 cmd.exe 94 PID 880 wrote to memory of 468 880 cmd.exe 95 PID 880 wrote to memory of 468 880 cmd.exe 95 PID 880 wrote to memory of 468 880 cmd.exe 95 PID 880 wrote to memory of 3992 880 cmd.exe 96 PID 880 wrote to memory of 3992 880 cmd.exe 96 PID 880 wrote to memory of 3992 880 cmd.exe 96 PID 880 wrote to memory of 784 880 cmd.exe 97 PID 880 wrote to memory of 784 880 cmd.exe 97 PID 880 wrote to memory of 784 880 cmd.exe 97 PID 880 wrote to memory of 4912 880 cmd.exe 98 PID 880 wrote to memory of 4912 880 cmd.exe 98 PID 880 wrote to memory of 4912 880 cmd.exe 98 PID 880 wrote to memory of 756 880 cmd.exe 99 PID 880 wrote to memory of 756 880 cmd.exe 99 PID 880 wrote to memory of 756 880 cmd.exe 99 PID 880 wrote to memory of 4748 880 cmd.exe 100 PID 880 wrote to memory of 4748 880 cmd.exe 100 PID 880 wrote to memory of 4748 880 cmd.exe 100 PID 880 wrote to memory of 5108 880 cmd.exe 101 PID 880 wrote to memory of 5108 880 cmd.exe 101 PID 880 wrote to memory of 5108 880 cmd.exe 101 PID 880 wrote to memory of 5000 880 cmd.exe 102 PID 880 wrote to memory of 5000 880 cmd.exe 102 PID 880 wrote to memory of 5000 880 cmd.exe 102 PID 880 wrote to memory of 3620 880 cmd.exe 105 PID 880 wrote to memory of 3620 880 cmd.exe 105 PID 880 wrote to memory of 3620 880 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebn banco.exe"C:\Users\Admin\AppData\Local\Temp\ebn banco.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c expand For.aifc For.aifc.bat & For.aifc.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\expand.exeexpand For.aifc For.aifc.bat3⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:3328
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Windows\SysWOW64\findstr.exefindstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:3992
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4279033⤵
- System Location Discovery: System Language Discovery
PID:784
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Slovenia.aifc3⤵
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "EIGHT" Menus3⤵
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 427903\Equipped.com + Restricted + Sas + Std + Lan + Phil + Inkjet + Council + Buffalo + Improved + Ink 427903\Equipped.com3⤵
- System Location Discovery: System Language Discovery
PID:4748
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Russell.aifc + ..\Geographical.aifc + ..\Mainland.aifc + ..\Packaging.aifc + ..\Editorial.aifc + ..\Mode.aifc + ..\Harley.aifc + ..\Secret.aifc m3⤵
- System Location Discovery: System Language Discovery
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\427903\Equipped.comEquipped.com m3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5000
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:3620
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD57bc93196724d41709fadba28faf0953b
SHA1a087cb4033692e0aca0c7363b5706e10d5827167
SHA2560a11c06eb1334fe27c5caaf5db1a57f5085dc600a281468a6ac4353221558123
SHA512a7ae04d1ab27bd091cdd7e54656095dd69b7e6399cfca6a6609008329fe0d8feb01609a660343d4a5764e9657c343d853af2d69c6e379258d483aed18bd44f00
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
508KB
MD5e54580063d19f560cd22047e5aa08c56
SHA14fafe383fb386e907c0d7208c4173d8b85fe2d37
SHA2568e51f7509f539fa5604644c872f4ed1840e8d307b2c45557015697c60fda4034
SHA51245de45e34b798f96166536e4b16d299f92e4db9a72991166af5e52501d5494e0c2c93925d6adf98cf5f739385e66f3af8a2696cd3e7d6a0a5678bcf650523921
-
Filesize
112KB
MD5dfa250062f0ce2e09471374d93e95e96
SHA15525240c677ee7913fd4ae59396e3e9dbb87b0e5
SHA256902ca558a5f0a6c4a39c91633b7f6240a78131a15dc8eda475fe89ce4c9ae092
SHA512d428c999b5902824558edb287126d7f7638a24f1271ebdfaa4ecb93a5352416b926854f8e6580112b35dee532e03dbe98728499d481767c18dd7faf681607671
-
Filesize
68KB
MD574b24c7e42a88c69b3b2c3bada09c8d0
SHA141b56be458e0f2195bd3e79ef58757811fee5e26
SHA256deab8d09a29a17121864283b458f135e6ca38047d482d3d0db59771aed7f25ff
SHA512c74b2dca0cf95f9fa047ee4a35776c411b10ee81cb86890b22a801eb952e470078cd3a847c95d6ad95fe14511bf62a0c112a63919c84edb918f75ed0b116ff07
-
Filesize
63KB
MD539b559e25f155c21a1dda3e2ce7aef47
SHA1ad76058df2abb8c3af5ac941b25b2d990eac90d1
SHA256294de29decadaa6b149cc9a9a7573720c85b23ce787dfffaa763fd95e90192a6
SHA51214db9809c0a6728903c1f7e2adb17ca15ee31462276479be67d124b9a622d38f6ed8a3a8d9ace28bc2f330d3894e061dcecb676b804c8d528e59938f7468a2d8
-
Filesize
53KB
MD5c09fd85c0f1494648de575888c0b416c
SHA1de5856df2b595d090adc99d508ca3923ad59ba84
SHA256e76aa81e7a0e6489be5f41a4e0875823e3b423e4a94ec3ce6cc0468d9920ff2a
SHA51286761849fbb2ec9e125e676606354b72dfb37a759a38408b2417bc0abaf57d7b9795d845a3bdd260e7af0507b06cb001e2b31a3bbb676e7a81248cbd453ed99e
-
Filesize
71KB
MD54ef9034d8a51107026fdc6cf91860b08
SHA1c3c31e22b2f9f4e61949708ea56e2f3dcb4df732
SHA2567b37a1816372d5b5e5af682e1787dac172f71ba48db848b146ef26bb025bacab
SHA51276d506c448e3158184ec5d36993681ee6fcdefdb139b0bf76059cb3c7a173141002408162381c79230b122f751f7d6c262390ebffe872e28d36a01c79ca5a6ee
-
Filesize
68KB
MD52fc2e8e862e1699ec831c3d0fd11da4d
SHA10561405c34b3a82a5e5a25602fb07584562839ae
SHA2560fe5c49798e1be760617e8036913482886930b0be9bdad00b8f2fd6937b18faf
SHA512bddd753b15e99d57bc2025a9bdeda27ba658ea9e89a6b306afd5292f0a78c50f42aa75e754690b96459fbe06b433024ba905ae8fe33c85fb01fca1e5246102a5
-
Filesize
28KB
MD53f739de0764c927931072d2f73218701
SHA1da903d6af9ff7ab91f3e276bbd9a14f11b2f51e9
SHA25657167168be441e5cdeda541460dc7b66cbd4b29e6b3b042d9c690d611fff0e8f
SHA512e9ddd7acb259acc5de71f9d56f0c98e4022a3ffcecd8300638a786709de12b420429d05f1a88e5b35c104f929d149046caa756ae34c4135657c0fc65af488ba4
-
Filesize
132KB
MD59655d5239986a90acbab6c53da2d0354
SHA1ec095293034330bffdcb33ab855319050c16316e
SHA256ecbdd86f514b4f38c50ebcf3961fa00bdb8de6d30537ea7b06c4e2d502207b23
SHA51226375aa0e759a56b3bc50fdd6565b040229f5b683959a349d000e95380312a9c46eade543ca1a5ee4400a0d554db9afa136e9101137f327c87e820c2ac326ccd
-
Filesize
87KB
MD51c792f8a690fc011231c550b2e450465
SHA15392a6fec3160be6dabc3065ef29d0ebfa466149
SHA25642363e264f6000cae647b81ecf809e9d02848d78a5bc3d61fa2c70dd9c64c179
SHA51269190daeed543febe5f39b94fef6c21c5fad3645f3d1947e64bbf81b7400d39dcb06308d7a94abae849b43867302f2423e1e1fa78932b0e7f4e4f356aa82bedb
-
Filesize
61KB
MD543a1955a6b1ff8a14c92cf23fffb3747
SHA1f7e120ec8d29635b432d66bc253341105133c96d
SHA256b868f10899bdd912d739a3b5fc4f2e2a35f7e2a109e18652947fb6cb37035677
SHA512ffdbbf98311b02c4710e73dbbced205b69108f31d88cf7ac31b6c62ed3fed5be88c9918bb77ed3cd713a7c679b59baa308edd3de086ed19d22e72e77a6ad6ab0
-
Filesize
1KB
MD5614d37e2852a0c74c323ad8bffa91905
SHA129f07aaae0359707c815646a77f27a809d0efec3
SHA25661cd800b752157fb1fb4eea78a9bd426d0c39529472f4adbd6edae8334f50788
SHA5125a9c4e57c50c976effb4a683cc1aa1ee6b323dbf30082a47bdd8055f72a51d14043679efec68dd7a0fea340c7b226d2b0f6799f7ef42f060777501ca6b9c3a59
-
Filesize
65KB
MD529368646fe8b286d28a4848125ed7da1
SHA15219b7a0587c8d2745cec27b40c28249339b77b5
SHA256d3d98583f8b9e6b9281820b2cf196e3b7a9e4d8e04569bc77fd878443184498b
SHA5125a306f36e76300e932f2eed760f5bdfc8eae0232d48410b00abe6cc71359e5dc99ada843ce4a3225bd5a6871e8cab2dc9cd4db818b548c303b2600551f5d6302
-
Filesize
88KB
MD569ffeabf678830de7946b6ad83fe3274
SHA1be6ca90c25f37269d45417ad3800c2daf08f412e
SHA256d739d88881ae2be71cbe876b8e60f671ac3f9fed0bdf35c2a78b4154155c9858
SHA512f11a02af27c161baa9cbec8caa0d86df0d160e92210f7527b60bc06e385556f1eeabf9ec239651957bdfb4df3452087ea0fa7a38f3dce459f7e9b2a64839019a
-
Filesize
79KB
MD537ca0e0d5d8513a7f80215d650d297dd
SHA1b8bebc4526d5a5d7661beff77e14c4641857852a
SHA256b0f5895279759536faa57b9c9e1635b350c4950e0963493f7234dee239f4c4fd
SHA5124ea3b94def91ebf5752413c1a48f8f8d2222b1ee17fcdcd15a5ca9f1b4d191bff3b0195c5f733910b259072f59bd2eed87ffab8fbc8e776627ae07395ba03d42
-
Filesize
122KB
MD5eabbdf1c36f6b33992066137f31406fd
SHA12f1dc6a3db706e6679e3d91ec7b16c2868350108
SHA256ddff4e1752a425617b15ee5d19cbabada079cc94a61531d862c8ffa21f008bcf
SHA51247267a0e89aa9f7dd351c99f0e5b771304d6fd767de4bb252b3116ac3520eed2a65504fe6e046a48990ebabdd08967a24d20c64882bdaca306448986fa65d8e7
-
Filesize
72KB
MD52ad72e604586b246cea8b8ba605c2c56
SHA163eb732fb0288f3afd8c01246f82e02e0e662324
SHA25607a379e77188d7fa16781afafec48db50506feb05d64a3c52a80fe6ba0a82ec3
SHA512444f3d53cb48572ccd53c0cd04fee7e6b131e8ddb1a639933a0eb6803451663ea6b99090daf8fb8435da2809bf2cfd8e371e49bef101fab7e20d7b00661bdc0e
-
Filesize
149KB
MD541f1de9f82f1846025de6647e97cc7c1
SHA174d3c0f0231609ddef2caa46ac89028901d3adf4
SHA25660636d24e5642c330585cbbfec4598cbdc9042463cbd2d1b6ce9dfe775985d83
SHA512ccaabc9e0f14ba4236b4f04016f82d678c0e1e092b9b987ea10a587df2f2c7531de81e413a473f61c137f2a47113549c2a2af59821fa687b8d1050465b887739
-
Filesize
35KB
MD516632706947982e014526cacc154ad08
SHA1ea0461ce3a024c95985caf29975fd8652e2994ea
SHA256dbe2636e667cc5072049ce770e62152c209f58ec2c56b2ff610ea079c02c981a
SHA51264daeac1b6be2b4d7c81b56f2eac8bff02173e0061b1b968aea8575b20e1c545e55f367059174c7ccd7d06c2486664acbc353f312eead518401a8bf426f20e5f
-
Filesize
476KB
MD55734c06ef55e35bffb7fe9554c33253c
SHA14cf54cde840894caf37a4ca088cc9fb25676d5c1
SHA256acdbfd622b919fe5c19c1d13467f8dfee80d6fa03887c8536aad23fcc317d2e7
SHA51268ddeb22f62353b924c3d0b44f0fdfa837ee0bb8d0de7e3db403677624db6b571c51cf5af763744b7c02926bb8487853954354ded5297e1ee4cd9858584940c6
-
Filesize
78KB
MD59670ed071e15d7bf7b4ce811c08f05d8
SHA1217cfb10e4a0cf753808505b053f44cd82cb8022
SHA25699b050b45465c8e07dac1a2edc40bdcce3c9ed2f38b0ba370377e90a577ca01c
SHA512f63ab9c4ab2504370da17fbb9c763a5e147921f6bd94f87a8e665b0d334f892dab5acc4c8c514b363e3aa87e2a111aaa9c8a3c5541ca2797a05348075ae0819a
-
Filesize
14KB
MD57329a2bd9c459ae97d5f3c963a0c37d5
SHA1772a88194b251124dacdf6a0e15b5c3cc6a3957a
SHA256296f7a5c22123ccfa5a54c4690af498abd08fdd70fccbc5b34da3bd21e3c1116
SHA512d8fc61cef700b120ab3bc18edf0f4360011c12fd1b4d2840ac5f866073aa50d73341b4b1fa2ed40485b723d66c446fdc4e8310c6c192d310e8e597ed90a05212