Analysis
-
max time kernel
107s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe
Resource
win10v2004-20250314-en
General
-
Target
a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe
-
Size
1.2MB
-
MD5
2eb62a9cb4bf34aa7148a76820c51d31
-
SHA1
c286f05d2aa11a67976312bfbf4bc792cc971764
-
SHA256
a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b
-
SHA512
13dbf48b6f384f78b5d6007866c172617a0774b9e27ecca48d3af6326c8e8f613163bf5a5d2e3dde98bab0d2d86ab93e37b3fb1b4a5ae9965a28e4b8dc8831e5
-
SSDEEP
24576:afaicdIfRzYcuRFKUb79GO7UufzmFKUb79GO7Uufz:ayic4I3KUbh57U2GKUbh57U2
Malware Config
Extracted
lumma
https://clarmodq.top/qoxo
https://soursopsf.run/gsoiao
https://changeaie.top/geps
https://ueasyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://xcelmodo.run/nahd
Signatures
-
Lumma family
-
Downloads MZ/PE file 3 IoCs
flow pid Process 51 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 50 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 46 1380 MSBuild.exe -
Executes dropped EXE 1 IoCs
pid Process 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 48 pastebin.com 49 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 1 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5500 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 6140 set thread context of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HO8ZI3OZKH4MMD69YGKTIJ7X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1460 schtasks.exe 6024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1380 MSBuild.exe 1380 MSBuild.exe 1380 MSBuild.exe 1380 MSBuild.exe 1380 MSBuild.exe 1380 MSBuild.exe 1380 MSBuild.exe 1380 MSBuild.exe 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 5116 powershell.exe 5116 powershell.exe 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeImpersonatePrivilege 1380 MSBuild.exe Token: SeImpersonatePrivilege 1380 MSBuild.exe Token: SeDebugPrivilege 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe Token: SeDebugPrivilege 5116 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 6140 wrote to memory of 2108 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 94 PID 6140 wrote to memory of 2108 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 94 PID 6140 wrote to memory of 2108 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 94 PID 6140 wrote to memory of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 PID 6140 wrote to memory of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 PID 6140 wrote to memory of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 PID 6140 wrote to memory of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 PID 6140 wrote to memory of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 PID 6140 wrote to memory of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 PID 6140 wrote to memory of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 PID 6140 wrote to memory of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 PID 6140 wrote to memory of 1380 6140 a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe 95 PID 1380 wrote to memory of 5404 1380 MSBuild.exe 101 PID 1380 wrote to memory of 5404 1380 MSBuild.exe 101 PID 1380 wrote to memory of 5404 1380 MSBuild.exe 101 PID 5404 wrote to memory of 5500 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 102 PID 5404 wrote to memory of 5500 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 102 PID 5404 wrote to memory of 5500 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 102 PID 5500 wrote to memory of 5116 5500 cmd.exe 104 PID 5500 wrote to memory of 5116 5500 cmd.exe 104 PID 5500 wrote to memory of 5116 5500 cmd.exe 104 PID 5404 wrote to memory of 184 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 105 PID 5404 wrote to memory of 184 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 105 PID 5404 wrote to memory of 184 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 105 PID 5404 wrote to memory of 4816 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 106 PID 5404 wrote to memory of 4816 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 106 PID 5404 wrote to memory of 4816 5404 HO8ZI3OZKH4MMD69YGKTIJ7X.exe 106 PID 184 wrote to memory of 1460 184 cmd.exe 109 PID 184 wrote to memory of 1460 184 cmd.exe 109 PID 184 wrote to memory of 1460 184 cmd.exe 109 PID 4816 wrote to memory of 6024 4816 cmd.exe 110 PID 4816 wrote to memory of 6024 4816 cmd.exe 110 PID 4816 wrote to memory of 6024 4816 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe"C:\Users\Admin\AppData\Local\Temp\a70c77735f279fe76a22770ce7abb6dcff5fabe7d1e1647c72137ec6e690329b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:6140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2108
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\HO8ZI3OZKH4MMD69YGKTIJ7X.exe"C:\Users\Admin\AppData\Local\Temp\HO8ZI3OZKH4MMD69YGKTIJ7X.exe"3⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5404 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C powershell -EncodedCommand "PAAjAGoAVwB2ADcAOABlADAAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwB3AFIAdgBLAGQARQBNAE4ASgBPAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAVABwAHQAVwB0AEcAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAeQBVADMAUgAjAD4A" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off4⤵
- Power Settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAGoAVwB2ADcAOABlADAAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwB3AFIAdgBLAGQARQBNAE4ASgBPAGoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAVABwAHQAVwB0AEcAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAeQBVADMAUgAjAD4A"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk6313" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk6313" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6024
-
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5c11a82d699a06d9b8ba4296e0c562ae4
SHA1e91963fe8def3ed151333a6a66d005237600ba30
SHA256483b1d7dac70de82e9b22a0c1ed775cf7e10b0a3790c5aa1b9215dbcd1754302
SHA512cc8644279ea2cebf70f594f6cc48d6ebbc10d036b7dcf1008fc05565da85cc36f7e8af7faa49b7c117c9a6ac94d7c007a99b53ec1dd668a7f8c28dc25b410a54
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82