Analysis
-
max time kernel
93s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20240729-en
General
-
Target
Install.exe
-
Size
459KB
-
MD5
ad38d43c1eca47ac35ac2139b87379ac
-
SHA1
86cbcc824c314d83a1e50c9a9c5e720a3a94944d
-
SHA256
8bbceb5526f4c4cf26a60c0094e8ebbf7811cc54500bb86e07de84b64d5c223c
-
SHA512
7fd4755a2111064a78fd2d9cefa67773bf7fb190e389aac5b460e9f4d82f0302524436989a86fc6b525208c81726a3830ad5ba447763152d5ca964c204c78e28
-
SSDEEP
12288:vV4fznmsrVQRW8D8XpjHCpJ+IYCNIqI2070iailr7v:vuyCFXpc+IYvqager7v
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Install.exedescription pid Process procid_target PID 4616 set thread context of 3976 4616 Install.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Install.exeInstall.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Install.exedescription pid Process procid_target PID 4616 wrote to memory of 3976 4616 Install.exe 84 PID 4616 wrote to memory of 3976 4616 Install.exe 84 PID 4616 wrote to memory of 3976 4616 Install.exe 84 PID 4616 wrote to memory of 3976 4616 Install.exe 84 PID 4616 wrote to memory of 3976 4616 Install.exe 84 PID 4616 wrote to memory of 3976 4616 Install.exe 84 PID 4616 wrote to memory of 3976 4616 Install.exe 84 PID 4616 wrote to memory of 3976 4616 Install.exe 84 PID 4616 wrote to memory of 3976 4616 Install.exe 84 PID 4616 wrote to memory of 3976 4616 Install.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3976
-