Analysis
-
max time kernel
149s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
Game_Setup v5.11.zip
Resource
win10v2004-20240730-en
Behavioral task
behavioral2
Sample
Config/audit/updater.exe
Resource
win10v2004-20240730-en
General
-
Target
Setup.exe
-
Size
17.1MB
-
MD5
747156a7bd20687ec90ae3e264247272
-
SHA1
04e0b441b0be4e108b76a57e7485d2b9cbe269d3
-
SHA256
55a2a16dbb85ed544d609fb33918b342cb1831bbca1e090abd51620354116981
-
SHA512
c5a40701e01e53499108203120c63cf428a10c71de20c6200ac087becce84605efe3c7f4cbafbe93ea8197dba23a6b1ff569d1976e073e9dbc1d23cbbafbb0d1
-
SSDEEP
98304:1O68R5feuenTuWjTuwAlval9bAmEmCVkzioZJ9wJEjETkmg:MOuenTuWjiRval9bAmCVu3gTRg
Malware Config
Extracted
lumma
https://illnesmunxkza.shop/api
https://shelterryujxo.shop/api
https://chequedxmznp.shop/api
https://triallyforwhgh.shop/api
https://shootydowtqosm.shop/api
https://faceddullinhs.shop/api
https://egorepetiiiosn.shop/api
https://ammycanedpors.shop/api
Extracted
lumma
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1324 set thread context of 540 1324 Setup.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1324 wrote to memory of 540 1324 Setup.exe 90 PID 1324 wrote to memory of 540 1324 Setup.exe 90 PID 1324 wrote to memory of 540 1324 Setup.exe 90 PID 1324 wrote to memory of 540 1324 Setup.exe 90 PID 1324 wrote to memory of 540 1324 Setup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1068