Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 04:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
Launcher.exe
-
Size
1.5MB
-
MD5
cc25614af4c9cee2879026d985088caa
-
SHA1
b898b3d40692477f3030916f6183ed5bb2d155fc
-
SHA256
aa40e94a784f08ba49d7983508c5d626390245090e0a164454af2f6cedc70cba
-
SHA512
ab52d5bc171ad24968794be99a5da45e0c4af57cad3100a1ab37521b0098c22b3b01ba87965a2805a078ef8001c72ce14b4e083fbd65135bd5672fdb78f94159
-
SSDEEP
24576:k1V5bEb5v837jDHNCFYC/kNMqc5wwcotkPh2sQNxPkd5zwdSNLDx:kfxCFNGMql5PnQNCrzy+
Malware Config
Extracted
Family
lumma
C2
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4056 set thread context of 964 4056 Launcher.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 1352 4056 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4948 4056 Launcher.exe 87 PID 4056 wrote to memory of 4948 4056 Launcher.exe 87 PID 4056 wrote to memory of 4948 4056 Launcher.exe 87 PID 4056 wrote to memory of 1656 4056 Launcher.exe 88 PID 4056 wrote to memory of 1656 4056 Launcher.exe 88 PID 4056 wrote to memory of 1656 4056 Launcher.exe 88 PID 4056 wrote to memory of 964 4056 Launcher.exe 89 PID 4056 wrote to memory of 964 4056 Launcher.exe 89 PID 4056 wrote to memory of 964 4056 Launcher.exe 89 PID 4056 wrote to memory of 964 4056 Launcher.exe 89 PID 4056 wrote to memory of 964 4056 Launcher.exe 89 PID 4056 wrote to memory of 964 4056 Launcher.exe 89 PID 4056 wrote to memory of 964 4056 Launcher.exe 89 PID 4056 wrote to memory of 964 4056 Launcher.exe 89 PID 4056 wrote to memory of 964 4056 Launcher.exe 89 PID 4056 wrote to memory of 964 4056 Launcher.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- System Location Discovery: System Language Discovery
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 6042⤵
- Program crash
PID:1352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4056 -ip 40561⤵PID:4880