Analysis
-
max time kernel
121s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
Setup2.exe
Resource
win7-20240704-en
General
-
Target
Setup2.exe
-
Size
9.0MB
-
MD5
5203def28edba8cdecbded67ed2cecb2
-
SHA1
e423a81a9cc3f9440144d80a56ce5075ce574c8d
-
SHA256
8e70554b23ba4f543189ecb533e4c7f7750ab16207b824d146bf13674004df6c
-
SHA512
7733d6e148d99bb74a059b8a132f08b58ed1c4e826b3e8b6b9ce60a31469374ed3669524fab7133c7ff83ff1a69ba6d0e259af1cacdfdc5b4842bd8d81b3bae2
-
SSDEEP
196608:eIALOUOl/+nYwov8FS7VVT1vAuVC2GYZwetDQ0Id:eIAL3O/MS8FS7LtC21weR
Malware Config
Extracted
lumma
https://kaminiasbbefow.shop/api
https://applyzxcksdia.shop/api
https://replacedoxcjzp.shop/api
https://declaredczxi.shop/api
https://catchddkxozvp.shop/api
https://arriveoxpzxo.shop/api
https://contemplateodszsv.shop/api
https://bindceasdiwozx.shop/api
https://conformfucdioz.shop/api
Extracted
lumma
https://tenntysjuxmz.shop/api
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation Setup2.exe -
Executes dropped EXE 4 IoCs
pid Process 400 w.exe 2872 ww.exe 1904 WmiPrvSE.exe 184 WmiPrvSE.exe -
Loads dropped DLL 1 IoCs
pid Process 400 w.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 400 set thread context of 2020 400 w.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 64 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2872 ww.exe 2872 ww.exe 1904 WmiPrvSE.exe 1904 WmiPrvSE.exe 184 WmiPrvSE.exe 184 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4232 wrote to memory of 400 4232 Setup2.exe 86 PID 4232 wrote to memory of 400 4232 Setup2.exe 86 PID 4232 wrote to memory of 400 4232 Setup2.exe 86 PID 400 wrote to memory of 2020 400 w.exe 89 PID 400 wrote to memory of 2020 400 w.exe 89 PID 400 wrote to memory of 2020 400 w.exe 89 PID 400 wrote to memory of 2020 400 w.exe 89 PID 400 wrote to memory of 2020 400 w.exe 89 PID 400 wrote to memory of 2020 400 w.exe 89 PID 400 wrote to memory of 2020 400 w.exe 89 PID 400 wrote to memory of 2020 400 w.exe 89 PID 400 wrote to memory of 2020 400 w.exe 89 PID 4232 wrote to memory of 2872 4232 Setup2.exe 90 PID 4232 wrote to memory of 2872 4232 Setup2.exe 90 PID 2872 wrote to memory of 64 2872 ww.exe 91 PID 2872 wrote to memory of 64 2872 ww.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup2.exe"C:\Users\Admin\AppData\Local\Temp\Setup2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\w.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\w.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ww.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ww.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /tn WmiPrvSES /tr "C:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exe" /sc minute /mo 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:64
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exeC:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
C:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exeC:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD52f5fe1a203da3240e80d0dfcb8e28359
SHA12e45da7f1002bf19b858812e2efaf0164c84dc73
SHA256e79a2b44f0cb5b8f58aba2d04536e420bbb23011fb981e63f63cb710587b8c2e
SHA512cecf37c7e3efb7e7cb2ec543e8f9bfc632c946b2e19100b178d3a93f48260f339a37efaf558f83f7168a7b52fb39183c48664218cb703060a2a4d56d44d1f261