Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 04:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
Launcher.exe
-
Size
1.5MB
-
MD5
cc25614af4c9cee2879026d985088caa
-
SHA1
b898b3d40692477f3030916f6183ed5bb2d155fc
-
SHA256
aa40e94a784f08ba49d7983508c5d626390245090e0a164454af2f6cedc70cba
-
SHA512
ab52d5bc171ad24968794be99a5da45e0c4af57cad3100a1ab37521b0098c22b3b01ba87965a2805a078ef8001c72ce14b4e083fbd65135bd5672fdb78f94159
-
SSDEEP
24576:k1V5bEb5v837jDHNCFYC/kNMqc5wwcotkPh2sQNxPkd5zwdSNLDx:kfxCFNGMql5PnQNCrzy+
Malware Config
Extracted
Family
lumma
C2
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 2492 1628 Launcher.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 1428 1628 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2344 1628 Launcher.exe 32 PID 1628 wrote to memory of 2344 1628 Launcher.exe 32 PID 1628 wrote to memory of 2344 1628 Launcher.exe 32 PID 1628 wrote to memory of 2344 1628 Launcher.exe 32 PID 1628 wrote to memory of 2344 1628 Launcher.exe 32 PID 1628 wrote to memory of 2344 1628 Launcher.exe 32 PID 1628 wrote to memory of 2344 1628 Launcher.exe 32 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 2492 1628 Launcher.exe 33 PID 1628 wrote to memory of 1428 1628 Launcher.exe 34 PID 1628 wrote to memory of 1428 1628 Launcher.exe 34 PID 1628 wrote to memory of 1428 1628 Launcher.exe 34 PID 1628 wrote to memory of 1428 1628 Launcher.exe 34 PID 1628 wrote to memory of 1428 1628 Launcher.exe 34 PID 1628 wrote to memory of 1428 1628 Launcher.exe 34 PID 1628 wrote to memory of 1428 1628 Launcher.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 2082⤵
- Program crash
PID:1428
-