Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
1/7loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1/7loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2/7loader.exe
Resource
win7-20240903-en
General
-
Target
1/7loader.exe
-
Size
44KB
-
MD5
2d538ba85d41c6a385e872201429380a
-
SHA1
aab6d07ea5390836a54b12c6836eb1106d7e9a44
-
SHA256
9c45ca71fda5862789cd866127e766b941de1f690b91144c1d4c1d967d1dc050
-
SHA512
76bc7b5b0a45147b23bac99bd7fc986c8bd407291cddffa9edf25ff88d9e8334221a48d9ab62c9bf37ab9eb7375b4ec4d2729ddeac7209c499e104f878168451
-
SSDEEP
384:V0KxGphJ6zC2eEF/dHoCkX73hDsSfkksLxG5wrNv+a2VSDSaVrr:+6zCY/+X7kpG5wrNGa2VSDSal
Malware Config
Extracted
lumma
https://a1m0sph3reds.cyou/api
Signatures
-
Lumma family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 3244 powershell.exe 2220 powershell.exe 3336 powershell.exe 2636 powershell.exe 3684 powershell.exe 3768 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7loader.exemillowsa.exeGxtuum.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 7loader.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation millowsa.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Gxtuum.exe -
Executes dropped EXE 5 IoCs
Processes:
millowsa.exeGxtuum.exepromotionforevetywere.exeGxtuum.exeGxtuum.exepid Process 3320 millowsa.exe 4864 Gxtuum.exe 5000 promotionforevetywere.exe 3572 Gxtuum.exe 4264 Gxtuum.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 22 raw.githubusercontent.com 23 raw.githubusercontent.com 51 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
promotionforevetywere.exedescription pid Process procid_target PID 5000 set thread context of 4344 5000 promotionforevetywere.exe 119 -
Drops file in Windows directory 1 IoCs
Processes:
millowsa.exedescription ioc Process File created C:\Windows\Tasks\Gxtuum.job millowsa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7loader.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exemillowsa.exeGxtuum.exepromotionforevetywere.exeMSBuild.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language millowsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language promotionforevetywere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2636 powershell.exe 2636 powershell.exe 3684 powershell.exe 3684 powershell.exe 3768 powershell.exe 3768 powershell.exe 3244 powershell.exe 3244 powershell.exe 2220 powershell.exe 2220 powershell.exe 3336 powershell.exe 3336 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
7loader.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepromotionforevetywere.exedescription pid Process Token: SeDebugPrivilege 3324 7loader.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 3684 powershell.exe Token: SeDebugPrivilege 3768 powershell.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 3336 powershell.exe Token: SeDebugPrivilege 5000 promotionforevetywere.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
7loader.exepowershell.exepowershell.exepowershell.exemillowsa.exeGxtuum.exepromotionforevetywere.exedescription pid Process procid_target PID 3324 wrote to memory of 2636 3324 7loader.exe 95 PID 3324 wrote to memory of 2636 3324 7loader.exe 95 PID 3324 wrote to memory of 2636 3324 7loader.exe 95 PID 2636 wrote to memory of 3684 2636 powershell.exe 97 PID 2636 wrote to memory of 3684 2636 powershell.exe 97 PID 2636 wrote to memory of 3684 2636 powershell.exe 97 PID 3324 wrote to memory of 3768 3324 7loader.exe 104 PID 3324 wrote to memory of 3768 3324 7loader.exe 104 PID 3324 wrote to memory of 3768 3324 7loader.exe 104 PID 3768 wrote to memory of 3244 3768 powershell.exe 106 PID 3768 wrote to memory of 3244 3768 powershell.exe 106 PID 3768 wrote to memory of 3244 3768 powershell.exe 106 PID 3324 wrote to memory of 2220 3324 7loader.exe 107 PID 3324 wrote to memory of 2220 3324 7loader.exe 107 PID 3324 wrote to memory of 2220 3324 7loader.exe 107 PID 2220 wrote to memory of 3336 2220 powershell.exe 109 PID 2220 wrote to memory of 3336 2220 powershell.exe 109 PID 2220 wrote to memory of 3336 2220 powershell.exe 109 PID 3324 wrote to memory of 3320 3324 7loader.exe 111 PID 3324 wrote to memory of 3320 3324 7loader.exe 111 PID 3324 wrote to memory of 3320 3324 7loader.exe 111 PID 3320 wrote to memory of 4864 3320 millowsa.exe 114 PID 3320 wrote to memory of 4864 3320 millowsa.exe 114 PID 3320 wrote to memory of 4864 3320 millowsa.exe 114 PID 4864 wrote to memory of 5000 4864 Gxtuum.exe 117 PID 4864 wrote to memory of 5000 4864 Gxtuum.exe 117 PID 4864 wrote to memory of 5000 4864 Gxtuum.exe 117 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119 PID 5000 wrote to memory of 4344 5000 promotionforevetywere.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\1\7loader.exe"C:\Users\Admin\AppData\Local\Temp\1\7loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Reiop'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Reiop3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Windows3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Users3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
-
C:\Reiop\millowsa.exe"C:\Reiop\millowsa.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\10000360101\promotionforevetywere.exe"C:\Users\Admin\AppData\Local\Temp\10000360101\promotionforevetywere.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵
- Executes dropped EXE
PID:3572
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵
- Executes dropped EXE
PID:4264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD5108530f51d914a0a842bd9dc66838636
SHA1806ca71de679d73560722f5cb036bd07241660e3
SHA25620ad93fa1ed6b5a682d8a4c8ba681f566597689d6ea943c2605412b233f0a538
SHA5128e1cdc49b57715b34642a55ee7a3b0cfa603e9a905d5a2a0108a7b2e3d682faec51c69b844a03088f2f4a50a7bf27feb3aabd9733853d9fb4b2ee4419261d05b
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
11KB
MD5b1d0a8d6572b7b8dba017fd2bc046340
SHA12e9fd481ef50398640cc55e278c2c3c8092b0666
SHA2567c726bfac604d603b3c6d680eb28d17ffe1fff63a314602db5aad3f8c506272a
SHA512686da1bd863e39734d68004054b18897c82db6c355b3288d6d700680e016e01ff23fe532d75acde2ef04afc98fd5ecbbb33111fd708372c7ef61664ca056996d
-
Filesize
11KB
MD51a77b968553a9c0217c6d65a2086cc12
SHA1bef374be51a7cba34c1de2e62d255f52195fe7c5
SHA25667fa714b25d95d8b3855ca8a89fc9b38a2831db0c3980ede3b3f97654e5fa08b
SHA51200af2d9e1c5d9e25b00cf3825c18a0e01e8766c3f1b041f8296d901edf965a07592af1463dc5ee08aee4fb31a9ee06b4a4d41c64d7b8a8f4c52b7fcf000418b5
-
Filesize
11KB
MD5cc9073ae10bd607cab8471eb30267ea0
SHA12248a85a7b12c7ea4a5e38b1470f0ce21f2e82a3
SHA256d4318f66fc929d82a88ef6367856ee71d2d959bd86fb9efd7183d63e6b063881
SHA512a2a40e5680636b7ef070fe4db373400f7dbd07439f63d7029d83238ab8de46a7771272f88f7e9256186774364c82bdb8b111e145020b589e228ce8fb2d137c92
-
Filesize
2.1MB
MD5f350caf603d2a5e09a9a5b61b9aaed33
SHA13914676fe58dd9151bfc62d3cdcada4ccb1ef708
SHA25666e449ba6fc695a7e0edfcf06e4411996250396ee281358c2f9c12b6d6f10f7d
SHA51228474cf6044c5e76401439eadf559ac19fc329742bfbd843f8855c33bbdd0817d768d0e866c2432c966b02d55d2a72df6da52159cca852afc48a02df65f52704
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82