Analysis
-
max time kernel
139s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 07:33
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240221-en
General
-
Target
Setup.exe
-
Size
2.3MB
-
MD5
5d52ef45b6e5bf144307a84c2af1581b
-
SHA1
414a899ec327d4a9daa53983544245b209f25142
-
SHA256
26a24d3b0206c6808615c7049859c2fe62c4dcd87e7858be40ae8112b0482616
-
SHA512
458f47c1e4ccf41edaacc57abb663ee77ca098fffc596fad941bbdea67653aeabc79b34d607078b9ee5adb45614e26f5c28a09e8faf9532081fdd5dec9ac3c48
-
SSDEEP
49152:DzO+g39FbI0eQf/Z3CarWedoYAmXviDTMtT2wkqN5K:DzO19Fnf/hdoYAm9ZkqN5K
Malware Config
Extracted
lumma
https://explocommisiowsa.shop/api
https://entitlementappwo.shop/api
https://economicscreateojsu.shop/api
https://pushjellysingeywus.shop/api
https://absentconvicsjawun.shop/api
https://suitcaseacanehalk.shop/api
https://bordersoarmanusjuw.shop/api
https://mealplayerpreceodsju.shop/api
https://wifeplasterbakewis.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 408 set thread context of 3524 408 Setup.exe 90 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 408 Setup.exe 408 Setup.exe 3524 netsh.exe 3524 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 408 Setup.exe 3524 netsh.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 408 wrote to memory of 3524 408 Setup.exe 90 PID 408 wrote to memory of 3524 408 Setup.exe 90 PID 408 wrote to memory of 3524 408 Setup.exe 90 PID 408 wrote to memory of 3524 408 Setup.exe 90 PID 3524 wrote to memory of 1820 3524 netsh.exe 99 PID 3524 wrote to memory of 1820 3524 netsh.exe 99 PID 3524 wrote to memory of 1820 3524 netsh.exe 99 PID 3524 wrote to memory of 1820 3524 netsh.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:1820
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:3248
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1016KB
MD5d6281e21b8dcb60196424e445deae8df
SHA11d45240cfef89b14d6f664f5123a03ecb8d6d3fc
SHA2567dc95a307b6ffe0cd2a4c67d0ce4ec49f1621438f360c5b2d679930108e75983
SHA51249926b17ac863af0ae196bec5183311ebde18cfed0e0d9358026cf24cba29db75b8a511e203c78784b96432664e08f15a704fa1a9037ad13ecc0a432bf64e4db