Overview
overview
10Static
static
3Qt5Core.dll
windows7-x64
1Qt5Core.dll
windows10-2004-x64
1Qt5Network.dll
windows7-x64
1Qt5Network.dll
windows10-2004-x64
1Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10config.exe
windows7-x64
1config.exe
windows10-2004-x64
3libcrypto-1_1-x64.dll
windows7-x64
1libcrypto-1_1-x64.dll
windows10-2004-x64
1libssl-1_1-x64.dll
windows7-x64
1libssl-1_1-x64.dll
windows10-2004-x64
1msvcp140.dll
windows7-x64
1msvcp140.dll
windows10-2004-x64
1msvcp140_1.dll
windows7-x64
1msvcp140_1.dll
windows10-2004-x64
1opengl64.exe
windows7-x64
1opengl64.exe
windows10-2004-x64
1steam_api64.dll
windows7-x64
1steam_api64.dll
windows10-2004-x64
1updater/NvStWiz.exe
windows7-x64
3updater/NvStWiz.exe
windows10-2004-x64
3vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1vcruntime140_1.dll
windows7-x64
1vcruntime140_1.dll
windows10-2004-x64
1x64/Register.dll
windows7-x64
3x64/Register.dll
windows10-2004-x64
3x64/glioma.asp
windows7-x64
3x64/glioma.asp
windows10-2004-x64
3x64/libvlc.dll
windows7-x64
3x64/libvlc.dll
windows10-2004-x64
3Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
Qt5Core.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Qt5Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Qt5Network.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Qt5Network.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
config.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
config.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
libcrypto-1_1-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
libcrypto-1_1-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
libssl-1_1-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
libssl-1_1-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
msvcp140.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
msvcp140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
msvcp140_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
msvcp140_1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
opengl64.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
opengl64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
steam_api64.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
steam_api64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
updater/NvStWiz.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
updater/NvStWiz.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
vcruntime140.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
vcruntime140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
vcruntime140_1.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
vcruntime140_1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
x64/Register.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
x64/Register.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
x64/glioma.asp
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
x64/glioma.asp
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
x64/libvlc.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
x64/libvlc.dll
Resource
win10v2004-20241007-en
General
-
Target
Setup.exe
-
Size
5.4MB
-
MD5
ad2735f096925010a53450cb4178c89e
-
SHA1
c6d65163c6315a642664f4eaec0fae9528549bfe
-
SHA256
4e775b5fafb4e6d89a4694f8694d2b8b540534bd4a52ff42f70095f1c929160e
-
SHA512
1868b22a7c5cba89545b06f010c09c5418b3d86039099d681eee9567c47208fdba3b89c6251cf03c964c58c805280d45ba9c3533125f6bd3e0bc067477e03ab9
-
SSDEEP
98304:o/zx+riUDpJowboU+XEsumY2XW6jBYeZ1ER:2x+riUDwUj12X1tY5
Malware Config
Extracted
lumma
https://5ptit5tuded.cyou/api
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 10 IoCs
flow pid Process 22 2208 msiexec.exe 24 2208 msiexec.exe 27 2208 msiexec.exe 29 2208 msiexec.exe 33 2208 msiexec.exe 35 2208 msiexec.exe 39 2208 msiexec.exe 41 2208 msiexec.exe 45 2208 msiexec.exe 47 2208 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2812 set thread context of 2540 2812 Setup.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2812 Setup.exe 2812 Setup.exe 2540 more.com 2540 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2812 Setup.exe 2540 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2540 2812 Setup.exe 91 PID 2812 wrote to memory of 2540 2812 Setup.exe 91 PID 2812 wrote to memory of 2540 2812 Setup.exe 91 PID 2812 wrote to memory of 2540 2812 Setup.exe 91 PID 2540 wrote to memory of 2208 2540 more.com 99 PID 2540 wrote to memory of 2208 2540 more.com 99 PID 2540 wrote to memory of 2208 2540 more.com 99 PID 2540 wrote to memory of 2208 2540 more.com 99 PID 2540 wrote to memory of 2208 2540 more.com 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5e5ee3cc9d186cae552074cf845d79c10
SHA10f6539bcd7bfa8f8d057f4192eea858e7ea2f254
SHA256b050b0650e0515deb24da1c4ce0ba7937ce07948dc488082d4ae9e6f9c0b0cae
SHA512c08b162a1142c358e4d499032f1b4418b72de096679ce24b3c3028aba9704ec9c8fcd31dd0ec0c20ded93a6b7f8c4b1b3acd4d5f647f8b5f3384c8ae93dc5869