Analysis
-
max time kernel
103s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 16:39
Static task
static1
General
-
Target
b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe
-
Size
1.1MB
-
MD5
c6945ad97b53b29921e841e2e8d31a42
-
SHA1
d5aebc0bdf58f652813fb489a0f842cc6b092306
-
SHA256
b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963
-
SHA512
cf02bd0d2b4db5a7adf9f207984148d9fc031d6e05f8ee65f2f02aa46818333c81cdc64cb3533fb7efb640413b77ee17302823de25e4245e5cade11b76bc5e69
-
SSDEEP
24576:kBTI7dCDKN3WT2iqSbysfw6MvJXMKwcbEPTlCXNXo7aL6UpN9Cix4iou5Wc:
Malware Config
Extracted
lumma
https://dynamiczl.live/tgre
https://soursopsf.run/gsoiao
https://changeaie.top/geps
https://easyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://xcelmodo.run/nahd
Signatures
-
Lumma family
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3976 set thread context of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 6092 calc.exe 6092 calc.exe 6092 calc.exe 6092 calc.exe 6092 calc.exe 6092 calc.exe 6092 calc.exe 6092 calc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeImpersonatePrivilege 6092 calc.exe Token: SeImpersonatePrivilege 6092 calc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3976 wrote to memory of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87 PID 3976 wrote to memory of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87 PID 3976 wrote to memory of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87 PID 3976 wrote to memory of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87 PID 3976 wrote to memory of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87 PID 3976 wrote to memory of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87 PID 3976 wrote to memory of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87 PID 3976 wrote to memory of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87 PID 3976 wrote to memory of 6092 3976 b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe"C:\Users\Admin\AppData\Local\Temp\b3370fc9e6050ac646424110a4efa3d98ddf62a0e0e8f4ae31203dec65d7f963.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\windows\SysWOW64\calc.exe"C:\windows\syswow64\calc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6092
-