Overview
overview
10Static
static
3Sample/Ias...in.dll
windows10-2004-x64
3Sample/Qt5Core.dll
windows7-x64
1Sample/Qt5Core.dll
windows10-2004-x64
1Sample/Qt5Gui.dll
windows7-x64
1Sample/Qt5Gui.dll
windows10-2004-x64
1Sample/Qt5Network.dll
windows7-x64
1Sample/Qt5Network.dll
windows10-2004-x64
1Sample/Qt5...rt.dll
windows7-x64
1Sample/Qt5...rt.dll
windows10-2004-x64
1Sample/Qt5Widgets.dll
windows7-x64
1Sample/Qt5Widgets.dll
windows10-2004-x64
1Sample/Setup.exe
windows7-x64
10Sample/Setup.exe
windows10-2004-x64
10Sample/StarBurn.dll
windows7-x64
1Sample/StarBurn.dll
windows10-2004-x64
1Sample/config.exe
windows7-x64
1Sample/config.exe
windows10-2004-x64
3Sample/msvcp140.dll
windows7-x64
1Sample/msvcp140.dll
windows10-2004-x64
1Sample/opengl64.exe
windows7-x64
1Sample/opengl64.exe
windows10-2004-x64
1Sample/vcr...40.dll
windows7-x64
1Sample/vcr...40.dll
windows10-2004-x64
1Sample/vcr..._1.dll
windows7-x64
1Sample/vcr..._1.dll
windows10-2004-x64
1Analysis
-
max time kernel
90s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 08:48
Static task
static1
Behavioral task
behavioral1
Sample
Sample/IasMigPlugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Sample/Qt5Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Sample/Qt5Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Sample/Qt5Gui.dll
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
Sample/Qt5Gui.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Sample/Qt5Network.dll
Resource
win7-20240729-en
Behavioral task
behavioral7
Sample
Sample/Qt5Network.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Sample/Qt5PrintSupport.dll
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
Sample/Qt5PrintSupport.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Sample/Qt5Widgets.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
Sample/Qt5Widgets.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
Sample/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
Sample/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Sample/StarBurn.dll
Resource
win7-20240729-en
Behavioral task
behavioral15
Sample
Sample/StarBurn.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Sample/config.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
Sample/config.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Sample/msvcp140.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
Sample/msvcp140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Sample/opengl64.exe
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
Sample/opengl64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
Sample/vcruntime140.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
Sample/vcruntime140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
Sample/vcruntime140_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
Sample/vcruntime140_1.dll
Resource
win10v2004-20241007-en
General
-
Target
Sample/Setup.exe
-
Size
1.2MB
-
MD5
b84dfabe933d1160f624693d94779ce5
-
SHA1
ac0133c09708fe4a3c626e3ba4cdf44d3a0e065f
-
SHA256
588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd
-
SHA512
eeaeef8d6b5fa02dedf9818babaa4b5ffdb87300521883aa290289dcc720b3d543279085ed3fc649b74654143e678502e56eb3f92c4baf53c075977de33c1b0e
-
SSDEEP
12288:RWiPQmboElHjsxc93LwnfXlP0CT7T4ir7XFXTqlj02F:5Qrat3knTvT4yDpqlj/F
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 11 IoCs
Processes:
msiexec.exeflow pid process 20 1560 msiexec.exe 22 1560 msiexec.exe 24 1560 msiexec.exe 28 1560 msiexec.exe 31 1560 msiexec.exe 33 1560 msiexec.exe 37 1560 msiexec.exe 39 1560 msiexec.exe 42 1560 msiexec.exe 44 1560 msiexec.exe 49 1560 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 4080 set thread context of 3956 4080 Setup.exe more.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
msiexec.exemore.comdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exemore.compid process 4080 Setup.exe 4080 Setup.exe 3956 more.com 3956 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exemore.compid process 4080 Setup.exe 3956 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Setup.exemore.comdescription pid process target process PID 4080 wrote to memory of 3956 4080 Setup.exe more.com PID 4080 wrote to memory of 3956 4080 Setup.exe more.com PID 4080 wrote to memory of 3956 4080 Setup.exe more.com PID 4080 wrote to memory of 3956 4080 Setup.exe more.com PID 3956 wrote to memory of 1560 3956 more.com msiexec.exe PID 3956 wrote to memory of 1560 3956 more.com msiexec.exe PID 3956 wrote to memory of 1560 3956 more.com msiexec.exe PID 3956 wrote to memory of 1560 3956 more.com msiexec.exe PID 3956 wrote to memory of 1560 3956 more.com msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sample\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Sample\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a4f91292755d3c2ae1c40cdf339f0749
SHA14731dc4ebfce72c2e22ab941ddaba14c44412e58
SHA256853bd942aca018b1d47c69eb225f2fb1326601cc66c1c81beed90fdcf97f2f4e
SHA5121186ad7bd82477d5af433b79ab71875b95140d95af8caad45acc4ddcf8ce84d3be200dd893c45a8a0125d93e8f8b912a53cbbfe1cb286a4e372c511209eb5cf3