Analysis
-
max time kernel
137s -
max time network
311s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
files.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
files.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
lnslIaIER-SellUPv4.2-gratisHUB.rar
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
lnslIaIER-SellUPv4.2-gratisHUB.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
lnslIaIER-SellUPv4.2-gratisHUB/Setup.exe
Resource
win7-20240221-en
General
-
Target
lnslIaIER-SellUPv4.2-gratisHUB/Setup.exe
-
Size
24.9MB
-
MD5
4365c9b87939fa394977adb5afbd8393
-
SHA1
59261556cb75a83f97f76e74a3844a53a3429557
-
SHA256
9bd2435ba80abf9ef85e8499742cb7f4987e5f9daac23525cd6e853450920537
-
SHA512
e202f748af96adcd270d4fb2086fae007fd5aaedf6971154907cd3e27cf0a2fc2f6ed88517fee9983196b79b3f242a42db202654c98677106c1b5b4876327a0e
-
SSDEEP
98304:bVVzLEUwf2wm0CRLqiezTADEM1kMbSMSwUpU:MX2wm0GLqiezTbM/U
Malware Config
Extracted
lumma
https://leafcalfconflcitw.shop/api
https://publicitycharetew.shop/api
https://computerexcudesp.shop/api
https://injurypiggyoewirog.shop/api
https://bargainnygroandjwk.shop/api
https://disappointcredisotw.shop/api
https://doughtdrillyksow.shop/api
https://facilitycoursedw.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 4648 set thread context of 5008 4648 Setup.exe BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
Setup.exedescription pid process target process PID 4648 wrote to memory of 5008 4648 Setup.exe BitLockerToGo.exe PID 4648 wrote to memory of 5008 4648 Setup.exe BitLockerToGo.exe PID 4648 wrote to memory of 5008 4648 Setup.exe BitLockerToGo.exe PID 4648 wrote to memory of 5008 4648 Setup.exe BitLockerToGo.exe PID 4648 wrote to memory of 5008 4648 Setup.exe BitLockerToGo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\lnslIaIER-SellUPv4.2-gratisHUB\Setup.exe"C:\Users\Admin\AppData\Local\Temp\lnslIaIER-SellUPv4.2-gratisHUB\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4648-2-0x00007FF796630000-0x00007FF79727D000-memory.dmpFilesize
12.3MB
-
memory/4648-6-0x00007FF796630000-0x00007FF79727D000-memory.dmpFilesize
12.3MB
-
memory/5008-5-0x0000000000700000-0x0000000000756000-memory.dmpFilesize
344KB
-
memory/5008-8-0x0000000000700000-0x0000000000756000-memory.dmpFilesize
344KB
-
memory/5008-9-0x0000000000700000-0x0000000000756000-memory.dmpFilesize
344KB