Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
datastate.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
datastate.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
sqlite3.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
sqlite3.dll
Resource
win10v2004-20240802-en
General
-
Target
Setup.exe
-
Size
1.6MB
-
MD5
ec539c4a9c60b3690fbd891e19333362
-
SHA1
7cd141b72d9c6701c27f939b790624ebe04668fd
-
SHA256
1d60149ce640f4e07bceeb8940950441025277f1eba4f501f8afe558030b34fe
-
SHA512
b6a3496e7b6f7aed5dcc7e0bb3fe903d2c231ff5470bbedd37e8bea83b1951dc835f32ac6508dea8b561bfd6354e7741227a42eb49fc0575ce64e12b494c00c1
-
SSDEEP
24576:Iz2WcNmHWLyc6+QrRIVkQirZieVPpd27K8mBWSjTUvJ2Npi8TofJ8jH3cT:RNmHyyc63YwQcTjT02NPTofJWXcT
Malware Config
Extracted
lumma
https://bassicnuadnwi.shop/api
https://locatedblsoqp.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2664 set thread context of 2684 2664 Setup.exe 85 -
Loads dropped DLL 1 IoCs
pid Process 2652 LarkManger.a3x -
Program crash 1 IoCs
pid pid_target Process procid_target 2284 2652 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LarkManger.a3x -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2664 Setup.exe 2664 Setup.exe 2684 more.com 2684 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2664 Setup.exe 2684 more.com -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2684 2664 Setup.exe 85 PID 2664 wrote to memory of 2684 2664 Setup.exe 85 PID 2664 wrote to memory of 2684 2664 Setup.exe 85 PID 2664 wrote to memory of 2684 2664 Setup.exe 85 PID 2684 wrote to memory of 2652 2684 more.com 96 PID 2684 wrote to memory of 2652 2684 more.com 96 PID 2684 wrote to memory of 2652 2684 more.com 96 PID 2684 wrote to memory of 2652 2684 more.com 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\LarkManger.a3xC:\Users\Admin\AppData\Local\Temp\LarkManger.a3x3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 13404⤵
- Program crash
PID:2284
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2652 -ip 26521⤵PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
2.0MB
MD53bf375fe658c0c7eb171f5fb42964f2f
SHA140917bf03e04b0eb456d8bddbc4d98ff88005b15
SHA2560dd4ce6b1d03db9f7589759236fac6d930a3bb7347e79073ea22717c2f853f66
SHA512c209d0e8757c4e1982fd7a918b456d63de718fa4070a7eaa3085ad10ee88175a7cf4a59e95f0a92c18abcd64d333ace33c1789dfeb9b3db279456db1c10d5c19