Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
24-11-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
IaslcsMo.txt.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IaslcsMo.txt.ps1
Resource
win10v2004-20241007-en
General
-
Target
IaslcsMo.txt.ps1
-
Size
29.7MB
-
MD5
d7c9613ed12144aea20bee90fd5057e5
-
SHA1
268f3d77e4b82f68c842a4c01f96a6ba864c09fb
-
SHA256
aa22e017141e1c5974e00c72f2de158072cf9279cfedff86ac1734c6947a19e8
-
SHA512
e4a89e623561f5b8434cabb5aaa2cef9d15bdff3f791029dbae8d017c8027928efec9371300b55ad5edde394673ba9c2a0ccac56f7996f69324010f55c30f77b
-
SSDEEP
49152:TUfvkgL6E9gTSTWi6fMJyDHol83vPi037qiLya6YWBJacr69CKwmxJUEqw2cl3+2:1
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://marchhappen.cyou
Extracted
lumma
https://marchhappen.cyou/api
https://frogs-severz.sbs/api
https://occupy-blushi.sbs/api
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://leg-sate-boat.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
Processes:
Set-up.exepid Process 5084 Set-up.exe -
Loads dropped DLL 7 IoCs
Processes:
Set-up.exepid Process 5084 Set-up.exe 5084 Set-up.exe 5084 Set-up.exe 5084 Set-up.exe 5084 Set-up.exe 5084 Set-up.exe 5084 Set-up.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetUtilityApp = "C:\\Users\\Admin\\AppData\\Roaming\\VWPGdipf\\Set-up.exe" powershell.exe -
Blocklisted process makes network request 11 IoCs
Processes:
msiexec.exeflow pid Process 21 3308 msiexec.exe 23 3308 msiexec.exe 26 3308 msiexec.exe 28 3308 msiexec.exe 30 3308 msiexec.exe 36 3308 msiexec.exe 38 3308 msiexec.exe 40 3308 msiexec.exe 42 3308 msiexec.exe 44 3308 msiexec.exe 46 3308 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Set-up.exedescription pid Process procid_target PID 5084 set thread context of 444 5084 Set-up.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Set-up.exemore.commsiexec.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exeSet-up.exemore.compid Process 5072 powershell.exe 5072 powershell.exe 5084 Set-up.exe 5084 Set-up.exe 444 more.com 444 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Set-up.exemore.compid Process 5084 Set-up.exe 444 more.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 5072 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
powershell.exeSet-up.exemore.comdescription pid Process procid_target PID 5072 wrote to memory of 5084 5072 powershell.exe 88 PID 5072 wrote to memory of 5084 5072 powershell.exe 88 PID 5072 wrote to memory of 5084 5072 powershell.exe 88 PID 5084 wrote to memory of 444 5084 Set-up.exe 91 PID 5084 wrote to memory of 444 5084 Set-up.exe 91 PID 5084 wrote to memory of 444 5084 Set-up.exe 91 PID 5084 wrote to memory of 444 5084 Set-up.exe 91 PID 444 wrote to memory of 3308 444 more.com 93 PID 444 wrote to memory of 3308 444 more.com 93 PID 444 wrote to memory of 3308 444 more.com 93 PID 444 wrote to memory of 3308 444 more.com 93 PID 444 wrote to memory of 3308 444 more.com 93
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\IaslcsMo.txt.ps11⤵
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Roaming\VWPGdipf\Set-up.exe"C:\Users\Admin\AppData\Roaming\VWPGdipf\Set-up.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe4⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:3308
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1020KB
MD5035bc63d4325772a00bd9bab18e9af4d
SHA1dcff6dbf51d54f2ce04222ee016e0b1e6e8c8dcc
SHA25604511303dd467eca261c232b81f09a0cd4fcd36cf60f08b7ae3fe29643e2b902
SHA5122d469ae3cf7513df8403803d46c15dd6dac8cb12591f860063d3d7117b83433aa4ba7d7da42de06ee1a20b5c50d3d85fc5f06e851cd686c6f2587311aee07ebe
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.5MB
MD517d26d22913c19d7a93f7f6af7ec5d95
SHA10bbc1e108af53990e4b9f2c34cbf7efbe442bc92
SHA256e18684e62b3c076b91a776b71539a8b7640932055ae0831b73ad5fee7c5dd4e7
SHA512fb2a4288be915d7e62e6dcd1a4425a77c5da69cc58daa7f175b921fd017cddb07f0d76c9016eb40475dead5dc7984b32b988ad6f5c5d14813b5a9e2867eb629a
-
Filesize
8.2MB
MD5831ba3a8c9d9916bdf82e07a3e8338cc
SHA16c89fd258937427d14d5042736fdfccd0049f042
SHA256d2c8c8b6cc783e4c00a5ef3365457d776dfc1205a346b676915e39d434f5a52d
SHA512beda57851e0e3781ece1d0ee53a3f86c52ba99cb045943227b6c8fc1848a452269f2768bf4c661e27ddfbe436df82cfd1de54706d814f81797a13fefec4602c5
-
Filesize
1.0MB
MD58a2e025fd3ddd56c8e4f63416e46e2ec
SHA15f58feb11e84aa41d5548f5a30fc758221e9dd64
SHA25652ae07d1d6a467283055a3512d655b6a43a42767024e57279784701206d97003
SHA5128e3a449163e775dc000e9674bca81ffabc7fecd9278da5a40659620cfc9cc07f50cc29341e74176fe10717b2a12ea3d5148d1ffc906bc809b1cd5c8c59de7ba1
-
Filesize
348KB
MD5e9a9411d6f4c71095c996a406c56129d
SHA180b6eefc488a1bf983919b440a83d3c02f0319dd
SHA256c9b2a31bfe75d1b25efcc44e1df773ab62d6d5c85ec5d0bc2dfe64129f8eab5e
SHA51293bb3dd16de56e8bed5ac8da125681391c4e22f4941c538819ad4849913041f2e9bb807eb5570ee13da167cfecd7a08d16ad133c244eb6d25f596073626ce8a2
-
Filesize
6.2MB
MD511c8962675b6d535c018a63be0821e4c
SHA1a150fa871e10919a1d626ffe37b1a400142f452b
SHA256421e36788bfcb4433178c657d49aa711446b3a783f7697a4d7d402a503c1f273
SHA5123973c23fc652e82f2415ff81f2756b55e46c6807cc4a8c37e5e31009cec45ab47c5d4228c03b5e3a972cacd6547cf0d3273965f263b1b2d608af89f5be6e459a
-
Filesize
654KB
MD5f75225db13e3b86477dc8658c63f9b99
SHA16ffd5596fd69e161b788001abab195cc609476cf
SHA2564286cf3c1ed10b8d6e2794ab4ed1cfcded0ea40d6794016ce926cd9b547c6a00
SHA51207dee210de39e9f303bb72558c4b2aeb5de597638f0a5bfdcbe8f8badfb46a45f7a1518726d543f18682214668d22586299159e2c3947a9285990867bc457327
-
Filesize
15KB
MD5744424fbbac9bba03e53dea3587e327e
SHA1b1cd89346897aa9a0787336b44e638e231b3cc15
SHA256e34c2c400fc112e079d825580f536ee43d5951f4dca0c2c6c9c521ca609f09a5
SHA5127c2291b8e813efd2c55d4d55620c435205848fcb3e0d7f8dc3153afa7d6b4bca7bbf80bb3f3732f850f80add87d8165deeb3b94bc735a70e18509e276627e812
-
Filesize
779KB
MD5150e5e57ae9177a2cd6e587df2d3b0ea
SHA188c981fb86b2624165cd1fab41f2c7cceb57151f
SHA2561c11168b529642ba3139672e4dd6be5b1cab7a206f220554155af997427d3da8
SHA512361c1596782bb064169f8ba622838ee945cb83ca422ff3277eebf574ac3e6257b7470a6705e0e4da2e996971ec04a849bbb45f8d86181a4db74b782a47814107
-
Filesize
411KB
MD503e9314004f504a14a61c3d364b62f66
SHA10aa3caac24fdf9d9d4c618e2bbf0a063036cd55d
SHA256a3ba6421991241bea9c8334b62c3088f8f131ab906c3cc52113945d05016a35f
SHA5122fcff4439d2759d93c57d49b24f28ae89b7698e284e76ac65fe2b50bdefc23a8cc3c83891d671de4e4c0f036cef810856de79ac2b028aa89a895bf35abff8c8d
-
Filesize
752KB
MD567ec459e42d3081dd8fd34356f7cafc1
SHA11738050616169d5b17b5adac3ff0370b8c642734
SHA2561221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067
SHA5129ed1c106df217e0b4e4fbd1f4275486ceba1d8a225d6c7e47b854b0b5e6158135b81be926f51db0ad5c624f9bd1d09282332cf064680dc9f7d287073b9686d33