Analysis
-
max time kernel
316s -
max time network
481s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02-05-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
1714654664.9576216_setup.exe
Resource
win10-20240404-en
General
-
Target
1714654664.9576216_setup.exe
-
Size
3.5MB
-
MD5
9c773ca35120d278e934beaa281ee353
-
SHA1
b9d6b488006eb05f85d790b12144309ab2d4be67
-
SHA256
7ced2a74467a6c893720a90362b09991fea0eba0f682556fd15f08a9fd7a9ac9
-
SHA512
9a33b36ca3215dbd2e37ad343bb627173f3985bc44162552354b5eec5f725fac0b1db985a7df2fef7fcf046f2b3b2e5473c377344470395e4f1284f4e2c6bebf
-
SSDEEP
98304:42b6HbvKrNUkWvjPJ6taLV18tRN8dru7C3mXWVwnw:42OHbSrikO12aX8twdeC3Vo
Malware Config
Extracted
lumma
https://shatterbreathepsw.shop/api
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
1714654664.9576216_setup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 1714654664.9576216_setup.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1714654664.9576216_setup.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation 1714654664.9576216_setup.exe -
Executes dropped EXE 1 IoCs
Processes:
9WfGoiso18ihLwttuoWWB4RE.exepid process 592 9WfGoiso18ihLwttuoWWB4RE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.myip.com 4 api.myip.com 5 ipinfo.io 6 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
1714654664.9576216_setup.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 1714654664.9576216_setup.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 1714654664.9576216_setup.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1714654664.9576216_setup.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1714654664.9576216_setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9WfGoiso18ihLwttuoWWB4RE.exedescription pid process target process PID 592 set thread context of 1128 592 9WfGoiso18ihLwttuoWWB4RE.exe BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
1714654664.9576216_setup.exe9WfGoiso18ihLwttuoWWB4RE.exedescription pid process target process PID 4372 wrote to memory of 592 4372 1714654664.9576216_setup.exe 9WfGoiso18ihLwttuoWWB4RE.exe PID 4372 wrote to memory of 592 4372 1714654664.9576216_setup.exe 9WfGoiso18ihLwttuoWWB4RE.exe PID 592 wrote to memory of 1128 592 9WfGoiso18ihLwttuoWWB4RE.exe BitLockerToGo.exe PID 592 wrote to memory of 1128 592 9WfGoiso18ihLwttuoWWB4RE.exe BitLockerToGo.exe PID 592 wrote to memory of 1128 592 9WfGoiso18ihLwttuoWWB4RE.exe BitLockerToGo.exe PID 592 wrote to memory of 1128 592 9WfGoiso18ihLwttuoWWB4RE.exe BitLockerToGo.exe PID 592 wrote to memory of 1128 592 9WfGoiso18ihLwttuoWWB4RE.exe BitLockerToGo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1714654664.9576216_setup.exe"C:\Users\Admin\AppData\Local\Temp\1714654664.9576216_setup.exe"1⤵
- Modifies firewall policy service
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\SimpleAdobe\9WfGoiso18ihLwttuoWWB4RE.exeC:\Users\Admin\Documents\SimpleAdobe\9WfGoiso18ihLwttuoWWB4RE.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\SimpleAdobe\9WfGoiso18ihLwttuoWWB4RE.exeFilesize
8.6MB
MD57e37f8c945d005226870e60aa2baea93
SHA1d8a457a032ead8cc0d692efd497914e8cc69e8a4
SHA256d130f492c40697a34e2d1e7b1e9a5e3ba37c7f6b4271271fba6b5c1e9048af8b
SHA512d6dfcbd1f7bca1e712bdb184a27c5a06eb1073f03529fd6be9ed2cd231e4906edf9c7bb6fd89453a7e062cc317e4655b19825fdbf7a32d0f2c3ac3ef4bc2f8d6
-
memory/592-32-0x00007FF672850000-0x00007FF67318E000-memory.dmpFilesize
9.2MB
-
memory/592-36-0x00007FF672850000-0x00007FF67318E000-memory.dmpFilesize
9.2MB
-
memory/1128-35-0x0000000000800000-0x000000000085B000-memory.dmpFilesize
364KB
-
memory/1128-37-0x0000000000800000-0x000000000085B000-memory.dmpFilesize
364KB
-
memory/4372-0-0x0000000140000000-0x0000000140547000-memory.dmpFilesize
5.3MB
-
memory/4372-1-0x0000000140509000-0x000000014050A000-memory.dmpFilesize
4KB
-
memory/4372-28-0x0000000140000000-0x0000000140547000-memory.dmpFilesize
5.3MB
-
memory/4372-29-0x0000000140000000-0x0000000140547000-memory.dmpFilesize
5.3MB