Overview
overview
10Static
static
3ExxxxSet_up.exe
windows7-x64
3ExxxxSet_up.exe
windows10-2004-x64
10UP/AspNetM...ni.dll
windows7-x64
1UP/AspNetM...ni.dll
windows10-2004-x64
1UP/AudioEn...er.dll
windows10-2004-x64
1UP/AudioEng.dll
windows10-2004-x64
1UP/AudioSes.dll
windows10-2004-x64
1UP/AuthFWSnapin.dll
windows7-x64
1UP/AuthFWSnapin.dll
windows10-2004-x64
1UP/audiosrv.dll
windows10-2004-x64
1UP/authfwcfg.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
ExxxxSet_up.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ExxxxSet_up.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
UP/AspNetMMCExt.ni.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
UP/AspNetMMCExt.ni.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
UP/AudioEndpointBuilder.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
UP/AudioEng.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
UP/AudioSes.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
UP/AuthFWSnapin.dll
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
UP/AuthFWSnapin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
UP/audiosrv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
UP/authfwcfg.dll
Resource
win10v2004-20240802-en
General
-
Target
ExxxxSet_up.exe
-
Size
749.4MB
-
MD5
fe069d8e3711f5c4ac4a0735a02fc303
-
SHA1
3352dcd0c6913f206dde60ea95afaff471895138
-
SHA256
dc5d859a301eec28319936a6b94d3eb439f7b62b890bcf177d25718a3b8418cc
-
SHA512
c0382e00c16c93e1e0c1a2a40937c84568cdb66f31e1735975546a3d1904d7b8ce12cb4d6c33ef07d993962daca6825a9446867305f308d29186729533289708
-
SSDEEP
196608:8lN3eZmCSq9xx0+tH8o7o3X0HXG6uq9+nkl0pIlKeRfMU/nV:sRExxrG3k2TqNvF
Malware Config
Extracted
lumma
https://condedqpwqm.shop/api
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 raw.githubusercontent.com 17 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2948 set thread context of 1944 2948 ExxxxSet_up.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExxxxSet_up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2948 ExxxxSet_up.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1944 2948 ExxxxSet_up.exe 101 PID 2948 wrote to memory of 1944 2948 ExxxxSet_up.exe 101 PID 2948 wrote to memory of 1944 2948 ExxxxSet_up.exe 101 PID 2948 wrote to memory of 1944 2948 ExxxxSet_up.exe 101 PID 2948 wrote to memory of 1944 2948 ExxxxSet_up.exe 101 PID 2948 wrote to memory of 1944 2948 ExxxxSet_up.exe 101 PID 2948 wrote to memory of 1944 2948 ExxxxSet_up.exe 101 PID 2948 wrote to memory of 1944 2948 ExxxxSet_up.exe 101 PID 2948 wrote to memory of 1944 2948 ExxxxSet_up.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExxxxSet_up.exe"C:\Users\Admin\AppData\Local\Temp\ExxxxSet_up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3840,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4144 /prefetch:81⤵PID:1620