Overview
overview
10Static
static
3σUŞe_~~1...σ.zip
windows7-x64
1σUŞe_~~1...σ.zip
windows10-2004-x64
1σUŞe_~~1...σ.zip
windows7-x64
1σUŞe_~~1...σ.zip
windows10-2004-x64
1Register.dll
windows7-x64
3Register.dll
windows10-2004-x64
3Resource/C...tity-H
windows7-x64
1Resource/C...tity-H
windows10-2004-x64
1Resource/C...tity-V
windows7-x64
1Resource/C...tity-V
windows10-2004-x64
1Resource/C...BK-EUC
windows7-x64
1Resource/C...BK-EUC
windows10-2004-x64
1Resource/C...TF16-H
windows7-x64
1Resource/C...TF16-H
windows10-2004-x64
1Resource/C...TF16-V
windows7-x64
1Resource/C...TF16-V
windows10-2004-x64
1Resource/F...td.otf
windows7-x64
4Resource/F...td.otf
windows10-2004-x64
7Resource/F...ld.otf
windows7-x64
4Resource/F...ld.otf
windows10-2004-x64
7Resource/F...ue.otf
windows7-x64
4Resource/F...ue.otf
windows10-2004-x64
7Resource/F...ue.otf
windows7-x64
4Resource/F...ue.otf
windows10-2004-x64
7Resource/F...td.otf
windows7-x64
4Resource/F...td.otf
windows10-2004-x64
7Resource/F...ld.otf
windows7-x64
4Resource/F...ld.otf
windows10-2004-x64
7Set-up.exe
windows7-x64
3Set-up.exe
windows10-2004-x64
10ccme_ecc.dll
windows7-x64
1ccme_ecc.dll
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
σUŞe_~~19111547~~__Asπσ_Pswd_σ.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
σUŞe_~~19111547~~__Asπσ_Pswd_σ.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
σUŞe_~~19111547~~__Asπσ_Pswd_σ.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
σUŞe_~~19111547~~__Asπσ_Pswd_σ.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Register.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Register.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Resource/CMap/Identity-H
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Resource/CMap/Identity-H
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Resource/CMap/Identity-V
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Resource/CMap/Identity-V
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Resource/CMap/UCS2-GBK-EUC
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Resource/CMap/UCS2-GBK-EUC
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Resource/CMap/UniKS-UTF16-H
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Resource/CMap/UniKS-UTF16-H
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Resource/CMap/UniKS-UTF16-V
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Resource/CMap/UniKS-UTF16-V
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Resource/Font/AdobePIStd.otf
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Resource/Font/AdobePIStd.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Resource/Font/CourierStd-Bold.otf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Resource/Font/CourierStd-Bold.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Resource/Font/CourierStd-BoldOblique.otf
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Resource/Font/CourierStd-BoldOblique.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Resource/Font/CourierStd-Oblique.otf
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Resource/Font/CourierStd-Oblique.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Resource/Font/CourierStd.otf
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Resource/Font/CourierStd.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Resource/Font/MinionPro-Bold.otf
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
Resource/Font/MinionPro-Bold.otf
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Set-up.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Set-up.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
ccme_ecc.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
ccme_ecc.dll
Resource
win10v2004-20241007-en
General
-
Target
Set-up.exe
-
Size
135KB
-
MD5
a2d70fbab5181a509369d96b682fc641
-
SHA1
22afcdc180400c4d2b9e5a6db2b8a26bff54dd38
-
SHA256
8aed681ad8d660257c10d2f0e85ae673184055a341901643f27afc38e5ef8473
-
SHA512
219c6e7e88004fad9f4392be9a852c58fc43b7f6900e40370991427f37eaea5c18f48d2954f9479dde8bcb787345f4e292d5620add8224aec4d93d7968820b83
-
SSDEEP
1536:URLRDTAC1CMoR1CqabJWt7AQFYMGhw1ScCD28v2Vv428fmvxOuw03h9VC:URdV1CMoiqadTQFBGhw1ED28+94hGw
Malware Config
Extracted
lumma
https://morningjoy.shop/api
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 11 IoCs
Processes:
msiexec.exeflow pid Process 15 868 msiexec.exe 17 868 msiexec.exe 21 868 msiexec.exe 23 868 msiexec.exe 29 868 msiexec.exe 31 868 msiexec.exe 35 868 msiexec.exe 37 868 msiexec.exe 39 868 msiexec.exe 45 868 msiexec.exe 47 868 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Set-up.exedescription pid Process procid_target PID 4808 set thread context of 3400 4808 Set-up.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Set-up.exemore.commsiexec.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Set-up.exemore.compid Process 4808 Set-up.exe 4808 Set-up.exe 3400 more.com 3400 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Set-up.exemore.compid Process 4808 Set-up.exe 3400 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Set-up.exemore.comdescription pid Process procid_target PID 4808 wrote to memory of 3400 4808 Set-up.exe 85 PID 4808 wrote to memory of 3400 4808 Set-up.exe 85 PID 4808 wrote to memory of 3400 4808 Set-up.exe 85 PID 4808 wrote to memory of 3400 4808 Set-up.exe 85 PID 3400 wrote to memory of 868 3400 more.com 92 PID 3400 wrote to memory of 868 3400 more.com 92 PID 3400 wrote to memory of 868 3400 more.com 92 PID 3400 wrote to memory of 868 3400 more.com 92 PID 3400 wrote to memory of 868 3400 more.com 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\Set-up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5fe14f8b8d49eaf681beba28004aeb801
SHA1256dd30f18beca632e8d822728c2871833c359ac
SHA2567d9fff00441a4cd583f34f3bf1c9fcdff6cabbc188ae423cd5853cd38eee0a2c
SHA51292c4b5ce4a07630c14eada31cc0d5e08b61dbb5270feeeeacb9f754933ba90f59989b70c946e25aef1c0267fd0ddbea878beb89868cd56d4c082ae50d3d03bf9