Analysis
-
max time kernel
194s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-07-2024 05:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe
Resource
win7-20240611-en
2 signatures
300 seconds
General
-
Target
6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe
-
Size
529KB
-
MD5
efb9f7b4e6703ad5d5b179992a6c44f8
-
SHA1
6f51ff5a147570a141ec8ce662501c21ff8b3530
-
SHA256
6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314
-
SHA512
389ea1f3881434c7aabad6c9ff4827cc595afb326d978de9dbf0cfd1f80d96f9d242e11da8025970f1cf594382f01b1c86e53476d5e7896ed802dd9c018d6dc0
-
SSDEEP
12288:yJ8TOT7hr3MBm3CCkf3HHhBjM14MqLNyjK3h//8wr+kv:yEU7hDMg3bkf3nbjZR//8kT
Malware Config
Extracted
Family
lumma
C2
https://harmfullyelobardek.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exedescription pid process target process PID 1468 set thread context of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4940 1468 WerFault.exe 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exedescription pid process target process PID 1468 wrote to memory of 4612 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 4612 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 4612 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 2368 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 2368 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 2368 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe PID 1468 wrote to memory of 3768 1468 6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe"C:\Users\Admin\AppData\Local\Temp\6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 3362⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1468-0-0x0000000000AB0000-0x0000000000AB1000-memory.dmpFilesize
4KB
-
memory/3768-1-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/3768-3-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/3768-4-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB