Overview
overview
10Static
static
3Sample/Ias...in.dll
windows10-2004-x64
3Sample/Qt5Core.dll
windows7-x64
1Sample/Qt5Core.dll
windows10-2004-x64
1Sample/Qt5Gui.dll
windows7-x64
1Sample/Qt5Gui.dll
windows10-2004-x64
1Sample/Qt5Network.dll
windows7-x64
1Sample/Qt5Network.dll
windows10-2004-x64
1Sample/Qt5...rt.dll
windows7-x64
1Sample/Qt5...rt.dll
windows10-2004-x64
1Sample/Qt5Widgets.dll
windows7-x64
1Sample/Qt5Widgets.dll
windows10-2004-x64
1Sample/Setup.exe
windows7-x64
10Sample/Setup.exe
windows10-2004-x64
10Sample/StarBurn.dll
windows7-x64
1Sample/StarBurn.dll
windows10-2004-x64
1Sample/config.exe
windows7-x64
1Sample/config.exe
windows10-2004-x64
3Sample/msvcp140.dll
windows7-x64
1Sample/msvcp140.dll
windows10-2004-x64
1Sample/opengl64.exe
windows7-x64
1Sample/opengl64.exe
windows10-2004-x64
1Sample/vcr...40.dll
windows7-x64
1Sample/vcr...40.dll
windows10-2004-x64
1Sample/vcr..._1.dll
windows7-x64
1Sample/vcr..._1.dll
windows10-2004-x64
1Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
Sample/IasMigPlugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Sample/Qt5Core.dll
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
Sample/Qt5Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Sample/Qt5Gui.dll
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
Sample/Qt5Gui.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Sample/Qt5Network.dll
Resource
win7-20241023-en
Behavioral task
behavioral7
Sample
Sample/Qt5Network.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Sample/Qt5PrintSupport.dll
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Sample/Qt5PrintSupport.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Sample/Qt5Widgets.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
Sample/Qt5Widgets.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
Sample/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
Sample/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Sample/StarBurn.dll
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
Sample/StarBurn.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Sample/config.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
Sample/config.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Sample/msvcp140.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
Sample/msvcp140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Sample/opengl64.exe
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
Sample/opengl64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
Sample/vcruntime140.dll
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
Sample/vcruntime140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
Sample/vcruntime140_1.dll
Resource
win7-20240729-en
Behavioral task
behavioral25
Sample
Sample/vcruntime140_1.dll
Resource
win10v2004-20241007-en
General
-
Target
Sample/Setup.exe
-
Size
1.2MB
-
MD5
b84dfabe933d1160f624693d94779ce5
-
SHA1
ac0133c09708fe4a3c626e3ba4cdf44d3a0e065f
-
SHA256
588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd
-
SHA512
eeaeef8d6b5fa02dedf9818babaa4b5ffdb87300521883aa290289dcc720b3d543279085ed3fc649b74654143e678502e56eb3f92c4baf53c075977de33c1b0e
-
SSDEEP
12288:RWiPQmboElHjsxc93LwnfXlP0CT7T4ir7XFXTqlj02F:5Qrat3knTvT4yDpqlj/F
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 11 IoCs
Processes:
msiexec.exeflow pid process 22 792 msiexec.exe 25 792 msiexec.exe 28 792 msiexec.exe 30 792 msiexec.exe 32 792 msiexec.exe 37 792 msiexec.exe 45 792 msiexec.exe 51 792 msiexec.exe 58 792 msiexec.exe 60 792 msiexec.exe 63 792 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 4040 set thread context of 2716 4040 Setup.exe more.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
msiexec.exemore.comdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exemore.compid process 4040 Setup.exe 4040 Setup.exe 2716 more.com 2716 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exemore.compid process 4040 Setup.exe 2716 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Setup.exemore.comdescription pid process target process PID 4040 wrote to memory of 2716 4040 Setup.exe more.com PID 4040 wrote to memory of 2716 4040 Setup.exe more.com PID 4040 wrote to memory of 2716 4040 Setup.exe more.com PID 4040 wrote to memory of 2716 4040 Setup.exe more.com PID 2716 wrote to memory of 792 2716 more.com msiexec.exe PID 2716 wrote to memory of 792 2716 more.com msiexec.exe PID 2716 wrote to memory of 792 2716 more.com msiexec.exe PID 2716 wrote to memory of 792 2716 more.com msiexec.exe PID 2716 wrote to memory of 792 2716 more.com msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sample\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Sample\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD51a6bf790e88b52afee8e0d698d434401
SHA1c44a361560925055878196614d6c214c74b358e5
SHA2564a06c04dab39cb72eb18a53eae6d5ffffc2e4715d62de7dddb94fd3d78a2f784
SHA512756842543690a2ce008e847d0c483fd7fa604ad163b34cdb87afb42205cdf6b9de7684369d108d5dfd664d92b13634cdc312292216b8eb612427428aa0034b0c