Analysis
-
max time kernel
10s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 16:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
VoicemodSetup.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
VoicemodSetup.exe
-
Size
284KB
-
MD5
246558ed006f01b60498078cfa630990
-
SHA1
e8b28476ca22c13c7854d4977ae9a4fc0c6c0aaa
-
SHA256
85befba77a3bb1b50c1192d10fddd913ad927adbce5f404ea43e2be617a68543
-
SHA512
2d74dbb8f1e146ed0d77c87b711a7c452f483bfbde702956abff832cd5b96ba5984eeb3b2786e51e365f655ecfac146dba610cd9a898355d5bdf0f611311edcd
-
SSDEEP
6144:IvGq/DOrjFEjeW9G+9EEj+3zEf7/jEDcHxTA8dCk:g//DO3ejs+9EpYDIqUq
Malware Config
Extracted
Family
lumma
C2
https://directorryversionyju.shop/api
https://birdpenallitysydw.shop/api
https://cinemaclinicttanwk.shop/api
https://disagreemenywyws.shop/api
https://speedparticipatewo.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
VoicemodSetup.exedescription pid Process procid_target PID 920 set thread context of 316 920 VoicemodSetup.exe 89 -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "156" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid Process 4736 LogonUI.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
VoicemodSetup.exedescription pid Process procid_target PID 920 wrote to memory of 316 920 VoicemodSetup.exe 89 PID 920 wrote to memory of 316 920 VoicemodSetup.exe 89 PID 920 wrote to memory of 316 920 VoicemodSetup.exe 89 PID 920 wrote to memory of 316 920 VoicemodSetup.exe 89 PID 920 wrote to memory of 316 920 VoicemodSetup.exe 89 PID 920 wrote to memory of 316 920 VoicemodSetup.exe 89 PID 920 wrote to memory of 316 920 VoicemodSetup.exe 89 PID 920 wrote to memory of 316 920 VoicemodSetup.exe 89 PID 920 wrote to memory of 316 920 VoicemodSetup.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\VoicemodSetup.exe"C:\Users\Admin\AppData\Local\Temp\VoicemodSetup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:316
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b8055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4736