Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20241010-en
General
-
Target
Setup.exe
-
Size
351.1MB
-
MD5
b6cf2050dc61fcc253eb7d7f9105f4c8
-
SHA1
f88ec60af42abdd3b67a980ae14eb4e58b3bc0e7
-
SHA256
42d6496db190c2800501a8205f23b610e5efe24312fcfe1ea8b9f6d66aaea9f1
-
SHA512
944de25459b38cce873f6076e14e40bf701f138002bc9182bba37ea08073185430432b24d07c369a023ebfc5d22d8f97dc622c8d9bc98c98c43fbd288ed307fa
-
SSDEEP
196608:Hi4rZPnHKOfiGJDxGOOBvaxvQAoOQpDbVHqHI+uzIQDQdy1VM1fzN6Do3pOVNAUe:Hi4rZPxfiGJDxGOOBvaxnQzMj
Malware Config
Extracted
lumma
https://servicedny.site
https://authorisev.site
https://faulteyotk.site
https://dilemmadu.site
https://contemteny.site
https://goalyfeastz.site
https://opposezmny.site
https://seallysl.site
https://reallymenyb.cyou
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid Process procid_target PID 2744 set thread context of 2688 2744 Setup.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Setup.exemore.comOpenWith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exemore.compid Process 2744 Setup.exe 2744 Setup.exe 2688 more.com 2688 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exemore.compid Process 2744 Setup.exe 2688 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Setup.exemore.comdescription pid Process procid_target PID 2744 wrote to memory of 2688 2744 Setup.exe 87 PID 2744 wrote to memory of 2688 2744 Setup.exe 87 PID 2744 wrote to memory of 2688 2744 Setup.exe 87 PID 2744 wrote to memory of 2688 2744 Setup.exe 87 PID 2688 wrote to memory of 3488 2688 more.com 97 PID 2688 wrote to memory of 3488 2688 more.com 97 PID 2688 wrote to memory of 3488 2688 more.com 97 PID 2688 wrote to memory of 3488 2688 more.com 97 PID 2688 wrote to memory of 3488 2688 more.com 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\OpenWith.exeC:\Windows\SysWOW64\OpenWith.exe3⤵
- System Location Discovery: System Language Discovery
PID:3488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD594175bd77bc17ca8f7c2196caba3f614
SHA1f9602cc39643864461fd30e04d01be8c8e82d411
SHA256526680305be37788cfd31337114c567329ee6f16a139f5496a9a9550442bd7c8
SHA5124e66917165b19e22fd2aa2f3cafb77e322046f8bf720b143719561936c69916c2a004537dbc2ad14dace514478318d6d31e9372387d383db9bb6369e6366addb
-
Filesize
1.1MB
MD518705c7fd92b80b6d3b328b761ec6612
SHA1fcbe7d95baf714b82d67c5288738646880628e3f
SHA256f65261135009cbaf340362e37f65523186bd4f7990e64d250689ab957e8d6d6e
SHA51279ccaf71bf99b49a8d075add2733b8c83b4f7adb9ba3c92cd9facc03bf6ea5a2527ae1ee0215d9c9e3c2121e68038036fb235c30e10f935cbf66aa6fd365518a