Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 17:52
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20240903-en
General
-
Target
Install.exe
-
Size
459KB
-
MD5
ad38d43c1eca47ac35ac2139b87379ac
-
SHA1
86cbcc824c314d83a1e50c9a9c5e720a3a94944d
-
SHA256
8bbceb5526f4c4cf26a60c0094e8ebbf7811cc54500bb86e07de84b64d5c223c
-
SHA512
7fd4755a2111064a78fd2d9cefa67773bf7fb190e389aac5b460e9f4d82f0302524436989a86fc6b525208c81726a3830ad5ba447763152d5ca964c204c78e28
-
SSDEEP
12288:vV4fznmsrVQRW8D8XpjHCpJ+IYCNIqI2070iailr7v:vuyCFXpc+IYvqager7v
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Install.exedescription pid Process procid_target PID 5020 set thread context of 4776 5020 Install.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Install.exeInstall.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Install.exedescription pid Process procid_target PID 5020 wrote to memory of 4776 5020 Install.exe 84 PID 5020 wrote to memory of 4776 5020 Install.exe 84 PID 5020 wrote to memory of 4776 5020 Install.exe 84 PID 5020 wrote to memory of 4776 5020 Install.exe 84 PID 5020 wrote to memory of 4776 5020 Install.exe 84 PID 5020 wrote to memory of 4776 5020 Install.exe 84 PID 5020 wrote to memory of 4776 5020 Install.exe 84 PID 5020 wrote to memory of 4776 5020 Install.exe 84 PID 5020 wrote to memory of 4776 5020 Install.exe 84 PID 5020 wrote to memory of 4776 5020 Install.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4776
-