Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13/09/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win11-20240802-en
General
-
Target
Setup.exe
-
Size
5.4MB
-
MD5
ad2735f096925010a53450cb4178c89e
-
SHA1
c6d65163c6315a642664f4eaec0fae9528549bfe
-
SHA256
4e775b5fafb4e6d89a4694f8694d2b8b540534bd4a52ff42f70095f1c929160e
-
SHA512
1868b22a7c5cba89545b06f010c09c5418b3d86039099d681eee9567c47208fdba3b89c6251cf03c964c58c805280d45ba9c3533125f6bd3e0bc067477e03ab9
-
SSDEEP
98304:o/zx+riUDpJowboU+XEsumY2XW6jBYeZ1ER:2x+riUDwUj12X1tY5
Malware Config
Extracted
lumma
https://complainnykso.shop/api
https://basedsymsotp.shop/api
https://charistmatwio.shop/api
https://grassemenwji.shop/api
https://stitchmiscpaew.shop/api
https://commisionipwn.shop/api
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 824 RelishKitchen.a3x -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5068 set thread context of 1180 5068 Setup.exe 73 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RelishKitchen.a3x -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5068 Setup.exe 5068 Setup.exe 1180 more.com 1180 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5068 Setup.exe 1180 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5068 wrote to memory of 1180 5068 Setup.exe 73 PID 5068 wrote to memory of 1180 5068 Setup.exe 73 PID 5068 wrote to memory of 1180 5068 Setup.exe 73 PID 5068 wrote to memory of 1180 5068 Setup.exe 73 PID 1180 wrote to memory of 824 1180 more.com 75 PID 1180 wrote to memory of 824 1180 more.com 75 PID 1180 wrote to memory of 824 1180 more.com 75 PID 1180 wrote to memory of 824 1180 more.com 75 PID 1180 wrote to memory of 824 1180 more.com 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\RelishKitchen.a3xC:\Users\Admin\AppData\Local\Temp\RelishKitchen.a3x3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
2.0MB
MD53ba76207544771358cc3cfc3b143738d
SHA1b15b3603fb86bd2f5986f71ca5df66177949d4e0
SHA2561ede10f36720de1054f1127a12aad5983c136279f8f331e36376e36d131feb96
SHA512f7a41413474d08816ed52a236e039e87aedd65ff8e628f138af8769bf638864c8aa24791944a16fcadedf8d11ca16d2983a1a613bf6bf76aa27f5bc345513d0b