Analysis
-
max time kernel
104s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 18:52
Static task
static1
General
-
Target
random.exe
-
Size
1.2MB
-
MD5
10df43a9bcda80911d9e23b6cdb590cc
-
SHA1
e750427f684fe5539465ca69d7ec870a64b04d2e
-
SHA256
e0a860108cfd2512018cf3d093810822ccad69b6bd25f8f0fc6080f882e36d2c
-
SHA512
6875986d8d7ec4721fcf3f06295d8cd5d2e48f6f2825fcc64bee4d13cd2d3444cd2bf4a6d52e366ce65fae8a386b77727182cf6b175187f214b1033d694d322e
-
SSDEEP
24576:xQBrDZNBpy9p/uGnNVJWA6E1KzfHRkqL8erhI3G9AW6Oaf:CBPURuGNVJWA62Kz+6lrhI29H6
Malware Config
Extracted
lumma
https://elvernwood.digital/gids
https://soursopsf.run/gsoiao
https://changeaie.top/geps
https://easyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://xcelmodo.run/nahd
Signatures
-
Lumma family
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1496 set thread context of 4436 1496 random.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4436 MSBuild.exe 4436 MSBuild.exe 4436 MSBuild.exe 4436 MSBuild.exe 4436 MSBuild.exe 4436 MSBuild.exe 4436 MSBuild.exe 4436 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeImpersonatePrivilege 4436 MSBuild.exe Token: SeImpersonatePrivilege 4436 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4436 1496 random.exe 92 PID 1496 wrote to memory of 4436 1496 random.exe 92 PID 1496 wrote to memory of 4436 1496 random.exe 92 PID 1496 wrote to memory of 4436 1496 random.exe 92 PID 1496 wrote to memory of 4436 1496 random.exe 92 PID 1496 wrote to memory of 4436 1496 random.exe 92 PID 1496 wrote to memory of 4436 1496 random.exe 92 PID 1496 wrote to memory of 4436 1496 random.exe 92 PID 1496 wrote to memory of 4436 1496 random.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-