Analysis
-
max time kernel
22s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
lSetup.exe
Resource
win7-20231215-en
General
-
Target
lSetup.exe
-
Size
202KB
-
MD5
64179e64675e822559cac6652298bdfc
-
SHA1
cceed3b2441146762512918af7bf7f89fb055583
-
SHA256
c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9
-
SHA512
ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280
-
SSDEEP
3072:EMtKztOp6KfOQqoY3ltdNjlcwsSdplkrxf+Uyecgw:ELKfOQLY3l9jlcwnlUf+z7gw
Malware Config
Extracted
lumma
https://qualifiedbehaviorrykej.site/api
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
cmd.exeflow pid process 28 5012 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
lSetup.exedescription pid process target process PID 1656 set thread context of 5012 1656 lSetup.exe cmd.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1240 5012 WerFault.exe cmd.exe 4020 5012 WerFault.exe cmd.exe 3956 5012 WerFault.exe cmd.exe 4636 5012 WerFault.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
lSetup.execmd.exepid process 1656 lSetup.exe 1656 lSetup.exe 5012 cmd.exe 5012 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
lSetup.exepid process 1656 lSetup.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
lSetup.exedescription pid process target process PID 1656 wrote to memory of 5012 1656 lSetup.exe cmd.exe PID 1656 wrote to memory of 5012 1656 lSetup.exe cmd.exe PID 1656 wrote to memory of 5012 1656 lSetup.exe cmd.exe PID 1656 wrote to memory of 5012 1656 lSetup.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\lSetup.exe"C:\Users\Admin\AppData\Local\Temp\lSetup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:5012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 11683⤵
- Program crash
PID:1240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 7563⤵
- Program crash
PID:4020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 7563⤵
- Program crash
PID:3956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 11603⤵
- Program crash
PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5012 -ip 50121⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5012 -ip 50121⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5012 -ip 50121⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5012 -ip 50121⤵PID:1412
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c4c3d0b4829295701801a5c7036bc640
SHA1adb70cb0264a8dee1850f05a964118cc14e5c12c
SHA25641bbaa38832596440e402ff5f4d6ef0b0bc1738711756e9910ecc5af30029554
SHA5129126c8737575553fb912ae666909280c220bc24434813dab1574429d04f36cc8afbcc9b65a5c458f39f3efca03fed7cfb731f7c513d4d58be2afa90e94a71493