Analysis
-
max time kernel
127s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
22-08-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
App_Sett-up.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
App_Sett-up.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
App_Sett-up.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
App_Sett-up.exe
Resource
win11-20240802-en
General
-
Target
App_Sett-up.exe
-
Size
16.5MB
-
MD5
df2a64542dbdf26476b4ab9b54979ec9
-
SHA1
9e42e69eee14d66687e669c81f0e788de4712904
-
SHA256
19f4865d0221ac47c0a8ad5393c0a150fdcccb5ef72a63eba7daa42955f7c6e8
-
SHA512
0c5abadf8498ad6bcdd1a73e5117ea7ce4dfb88a4d51bb8031d20bfa5d5bb4c114f7117cfa0a2f6c50f70af16d16a9f36ef23fadcc480ba8fe5854301c8f5abd
-
SSDEEP
98304:mtNQAcLoqerVdHeUmyg9gGM1N5f7bNKBNo+gQXQi7kmeHh2yeH7rkfvVsg:QpO9zM1NJNKBLXQi7ZkfvVs
Malware Config
Extracted
lumma
https://readdyloopyeow.shop/api
https://potentioallykeos.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4396 set thread context of 2080 4396 App_Sett-up.exe 71 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App_Sett-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootcfg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4396 wrote to memory of 2080 4396 App_Sett-up.exe 71 PID 4396 wrote to memory of 2080 4396 App_Sett-up.exe 71 PID 4396 wrote to memory of 2080 4396 App_Sett-up.exe 71 PID 4396 wrote to memory of 2080 4396 App_Sett-up.exe 71 PID 4396 wrote to memory of 2080 4396 App_Sett-up.exe 71 PID 4396 wrote to memory of 2080 4396 App_Sett-up.exe 71 PID 4396 wrote to memory of 2080 4396 App_Sett-up.exe 71 PID 4396 wrote to memory of 2080 4396 App_Sett-up.exe 71 PID 4396 wrote to memory of 2080 4396 App_Sett-up.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\App_Sett-up.exe"C:\Users\Admin\AppData\Local\Temp\App_Sett-up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\bootcfg.exe"C:\Windows\SysWOW64\bootcfg.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2080
-