Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20241010-en
General
-
Target
Setup.exe
-
Size
351.1MB
-
MD5
b6cf2050dc61fcc253eb7d7f9105f4c8
-
SHA1
f88ec60af42abdd3b67a980ae14eb4e58b3bc0e7
-
SHA256
42d6496db190c2800501a8205f23b610e5efe24312fcfe1ea8b9f6d66aaea9f1
-
SHA512
944de25459b38cce873f6076e14e40bf701f138002bc9182bba37ea08073185430432b24d07c369a023ebfc5d22d8f97dc622c8d9bc98c98c43fbd288ed307fa
-
SSDEEP
196608:Hi4rZPnHKOfiGJDxGOOBvaxvQAoOQpDbVHqHI+uzIQDQdy1VM1fzN6Do3pOVNAUe:Hi4rZPxfiGJDxGOOBvaxnQzMj
Malware Config
Extracted
lumma
https://servicedny.site
https://authorisev.site
https://faulteyotk.site
https://dilemmadu.site
https://contemteny.site
https://goalyfeastz.site
https://opposezmny.site
https://seallysl.site
https://reallymenyb.cyou
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid Process procid_target PID 1552 set thread context of 4708 1552 Setup.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Setup.exemore.comOpenWith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exemore.compid Process 1552 Setup.exe 1552 Setup.exe 4708 more.com 4708 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exemore.compid Process 1552 Setup.exe 4708 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Setup.exemore.comdescription pid Process procid_target PID 1552 wrote to memory of 4708 1552 Setup.exe 83 PID 1552 wrote to memory of 4708 1552 Setup.exe 83 PID 1552 wrote to memory of 4708 1552 Setup.exe 83 PID 1552 wrote to memory of 4708 1552 Setup.exe 83 PID 4708 wrote to memory of 956 4708 more.com 90 PID 4708 wrote to memory of 956 4708 more.com 90 PID 4708 wrote to memory of 956 4708 more.com 90 PID 4708 wrote to memory of 956 4708 more.com 90 PID 4708 wrote to memory of 956 4708 more.com 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\OpenWith.exeC:\Windows\SysWOW64\OpenWith.exe3⤵
- System Location Discovery: System Language Discovery
PID:956
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD594175bd77bc17ca8f7c2196caba3f614
SHA1f9602cc39643864461fd30e04d01be8c8e82d411
SHA256526680305be37788cfd31337114c567329ee6f16a139f5496a9a9550442bd7c8
SHA5124e66917165b19e22fd2aa2f3cafb77e322046f8bf720b143719561936c69916c2a004537dbc2ad14dace514478318d6d31e9372387d383db9bb6369e6366addb
-
Filesize
1.1MB
MD5bf719406c394c93605f05d4fce37303a
SHA1f5a225267c543d5f3b5abada792c7a0fb05a4ad6
SHA256fddc591701be3dee8e3b06eef60a151020bbff35bdc5c1caf614211396970c62
SHA5120cc115ad629d4c83ef8010563c06f64e587d2ccecde5cf8d4f7ea93ef9a22ea7661db77c6ecbffa1ee14f0e1ee0809412e5ac3bcd136abc010b4324b46895ad9