Analysis
-
max time kernel
256s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 07:45
Static task
static1
Behavioral task
behavioral1
Sample
Renz Client.exe
Resource
win7-20240508-en
General
-
Target
Renz Client.exe
-
Size
950KB
-
MD5
d558d404080f9d44ce440d6783140f54
-
SHA1
614b2ef8b9ae235281361033263f3c105b0fa250
-
SHA256
28d1fde37c29dffc998ae4b22da6fe8dababe746b440aa17cdae45a6372ab16c
-
SHA512
f732bbb2c0644797509905e56aff2d7840af7fd190818531d2d7ba61c10e2f97eb9c0825e4c8d9b64035bfba39de072f5389b5ffa1d972c4316096958f05033e
-
SSDEEP
24576:5KdodQCtwExZxOFyyUF73GE7mRSSUQH5np1eOURJ8sGUM:dwExZxOFVXMmR9rnfEYsnM
Malware Config
Extracted
lumma
https://piedsiggnycliquieaw.shop/api
https://potterryisiw.shop/api
https://foodypannyjsud.shop/api
https://contintnetksows.shop/api
https://reinforcedirectorywd.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Renz Client.exedescription pid process target process PID 4776 set thread context of 2276 4776 Renz Client.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4524 4776 WerFault.exe Renz Client.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 2540 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 2540 taskmgr.exe Token: SeSystemProfilePrivilege 2540 taskmgr.exe Token: SeCreateGlobalPrivilege 2540 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe 2540 taskmgr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Renz Client.exedescription pid process target process PID 4776 wrote to memory of 2300 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2300 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2300 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2276 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2276 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2276 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2276 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2276 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2276 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2276 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2276 4776 Renz Client.exe RegAsm.exe PID 4776 wrote to memory of 2276 4776 Renz Client.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Renz Client.exe"C:\Users\Admin\AppData\Local\Temp\Renz Client.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 2802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4776 -ip 47761⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2276-4-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/2276-1-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/2276-3-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/2540-5-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/2540-6-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/2540-7-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/2540-11-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/2540-17-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/2540-16-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/2540-15-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/2540-14-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/2540-13-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/2540-12-0x0000023C2B3C0000-0x0000023C2B3C1000-memory.dmpFilesize
4KB
-
memory/4776-0-0x0000000000590000-0x0000000000591000-memory.dmpFilesize
4KB