Overview
overview
10Static
static
3#!NewFiile...�s.zip
windows10-2004-x64
1Language/an.txt
windows10-2004-x64
1Language/ar.txt
windows10-2004-x64
1Language/az.txt
windows10-2004-x64
1Language/be.txt
windows10-2004-x64
1Language/bn.txt
windows10-2004-x64
1Language/co.txt
windows10-2004-x64
1Language/da.txt
windows10-2004-x64
1Language/el.txt
windows10-2004-x64
1Language/es.txt
windows10-2004-x64
1Language/eu.txt
windows10-2004-x64
1Language/fa.txt
windows10-2004-x64
1Language/fr.txt
windows10-2004-x64
1Language/fy.txt
windows10-2004-x64
1Language/gl.txt
windows10-2004-x64
1Language/he.pak
windows10-2004-x64
3Language/hi.pak
windows10-2004-x64
3Language/hr.pak
windows10-2004-x64
3Language/hu.pak
windows10-2004-x64
3Language/hy.txt
windows10-2004-x64
1Language/is.txt
windows10-2004-x64
1Language/ja.txt
windows10-2004-x64
1Language/kaa.txt
windows10-2004-x64
1Language/kk.txt
windows10-2004-x64
1Language/ku-ckb.txt
windows10-2004-x64
1Language/lij.txt
windows10-2004-x64
1Language/mk.txt
windows10-2004-x64
1Language/mng.txt
windows10-2004-x64
1Setup.exe
windows10-2004-x64
10en-US/Auto...eN.dll
windows10-2004-x64
1en-US/avicap32.dll
windows10-2004-x64
1vcruntime140.dll
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙs.zip
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
Language/an.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Language/ar.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
Language/az.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Language/be.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral6
Sample
Language/bn.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Language/co.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
Language/da.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Language/el.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
Language/es.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
Language/eu.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral12
Sample
Language/fa.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Language/fr.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral14
Sample
Language/fy.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
Language/gl.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
Language/he.pak
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Language/hi.pak
Resource
win10v2004-20240419-en
Behavioral task
behavioral18
Sample
Language/hr.pak
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
Language/hu.pak
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
Language/hy.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Language/is.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
Language/ja.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
Language/kaa.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral24
Sample
Language/kk.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Language/ku-ckb.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
Language/lij.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Language/mk.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral28
Sample
Language/mng.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Setup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral30
Sample
en-US/AutoWorkplaceN.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
en-US/avicap32.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral32
Sample
vcruntime140.dll
Resource
win10v2004-20240426-en
General
-
Target
Setup.exe
-
Size
684.0MB
-
MD5
6074b20c55c562f942ca7b591d3306f1
-
SHA1
536a053664bb7cbf88b6908c6acb0889c61d706d
-
SHA256
6f0a3619dae4e23f78b527e658ab2c2ee05b4f7a0393d3064ec704b213d2483d
-
SHA512
dfad2d28398b94113759fe10a28fe47cb1f52ec70e97bb9c3248bde4bdb6db8df4c80a362066b4fec6d648d064cd4520dd081fe1a4cd70fa93a458e3c4cd4ee5
-
SSDEEP
196608:NzI83e24i8fZVsIHSGjsWQcwATPlc3WJy+43Y/I7ibkF+Q5ptGu:74iwsgNjsWQV
Malware Config
Extracted
lumma
https://joblkessprosgeow.shop/api
https://acceptabledcooeprs.shop/api
https://obsceneclassyjuwks.shop/api
https://zippyfinickysofwps.shop/api
https://miniaturefinerninewjs.shop/api
https://plaintediousidowsko.shop/api
https://sweetsquarediaslw.shop/api
https://holicisticscrarws.shop/api
https://boredimperissvieos.shop/api
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4308 set thread context of 4460 4308 Setup.exe 94 PID 4460 set thread context of 2240 4460 netsh.exe 98 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4308 Setup.exe 4308 Setup.exe 4460 netsh.exe 4460 netsh.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4308 Setup.exe 4460 netsh.exe 4460 netsh.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4460 4308 Setup.exe 94 PID 4308 wrote to memory of 4460 4308 Setup.exe 94 PID 4308 wrote to memory of 4460 4308 Setup.exe 94 PID 4308 wrote to memory of 4460 4308 Setup.exe 94 PID 4460 wrote to memory of 2240 4460 netsh.exe 98 PID 4460 wrote to memory of 2240 4460 netsh.exe 98 PID 4460 wrote to memory of 2240 4460 netsh.exe 98 PID 4460 wrote to memory of 2240 4460 netsh.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe3⤵PID:2240
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53e74adcad456fbca64774f9dddabe3f4
SHA1d6648cd4bc37cd5655274f6ce6c8115113bf2b8e
SHA25660e5fcc5cf0b7fbd0c10c9a76d8a09a98d4e01e150cbcd3c2f4f55f467eee42a
SHA5126914cce6798c06520ce8a7658c0717f29b543d43741dff417564bb07b8ad420eae513629d38e326da5e916f6b980bbf178817bef1a572a27702ac09fac211cc5
-
Filesize
1022KB
MD5568a2f1eefa9bd904cc6c89b94f00b63
SHA1df3d6a9dc94813f852aaf0a4bf4652414ed536f9
SHA256512279aa6f86815d63f6d3a2be39c52cba81f048061a9c7f6bf29ee664d1832f
SHA512ca46358488e0e09abb1059d46fbdef2a74d97516062752308872bb6556ea256c946151886485a58457042d3641c83d18ad582a61e8bb57995088af932ac08f26