Analysis
-
max time kernel
76s -
max time network
84s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
24-02-2024 13:32
Static task
static1
General
-
Target
Setupx32_x64.exe
-
Size
319KB
-
MD5
40120c6767de5340629ad6db820c0ee7
-
SHA1
c4d96d89ac3c957e0b0a53594e17a522123841a2
-
SHA256
e23dbc051aa68653ec8875dd02c2c37cd81e78263858ce59b6a3fd7b8a936b3e
-
SHA512
d9d2816e322ef57821d09b4a8408afaf8f7fb749c9989b09c39bc6f43d4fd79d016578212576c61edfe40b47464453b6c7961214c43a31c0cfa3ba6ce7a35e45
-
SSDEEP
6144:hJJXkh9NPGRyvRIW5ppOU4Hn/VOgurG627rLik3:LCNKQSWlO5HEhSfd3
Malware Config
Extracted
Family
lumma
C2
https://technologyenterdo.shop/api
https://detectordiscusser.shop/api
https://turkeyunlikelyofw.shop/api
https://associationokeo.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1100 set thread context of 4812 1100 Setupx32_x64.exe 74 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1100 wrote to memory of 4812 1100 Setupx32_x64.exe 74 PID 1100 wrote to memory of 4812 1100 Setupx32_x64.exe 74 PID 1100 wrote to memory of 4812 1100 Setupx32_x64.exe 74 PID 1100 wrote to memory of 4812 1100 Setupx32_x64.exe 74 PID 1100 wrote to memory of 4812 1100 Setupx32_x64.exe 74 PID 1100 wrote to memory of 4812 1100 Setupx32_x64.exe 74 PID 1100 wrote to memory of 4812 1100 Setupx32_x64.exe 74 PID 1100 wrote to memory of 4812 1100 Setupx32_x64.exe 74 PID 1100 wrote to memory of 4812 1100 Setupx32_x64.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setupx32_x64.exe"C:\Users\Admin\AppData\Local\Temp\Setupx32_x64.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4812
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2124