Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 01:53
Static task
static1
General
-
Target
Stover Launcher.rar
-
Size
3.3MB
-
MD5
9ceb9d749842eb84f2a001cbd51c1cf4
-
SHA1
53c8b425a52bb14ddc26bc0b8987e06fe982f43b
-
SHA256
6c1ae2ea634d7dfb613450b14687d0ff7d8bfa3b96e12ab1cb58bcc85ecef6a2
-
SHA512
91d982781d23ddb3f362da2d711a6d86c462b7117661e18d447d4e16fb0e766f7898b0aeff20504904f079957ca8e7b9c3addfb8ee69395ee24a9dbe7f46d856
-
SSDEEP
98304:tICdzprSxk9zR6xZak9j9hMtGooKbYAovQQE7gV:2Cd9r0MzeZbl9hMtGwovQvu
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Signatures
-
Lumma family
-
Executes dropped EXE 7 IoCs
Processes:
stoverlauncher.exestoverlauncher.exestoverlauncher.exestoverlauncher.exestoverlauncher.exestoverlauncher.exestoverlauncher.exepid Process 224 stoverlauncher.exe 1636 stoverlauncher.exe 2532 stoverlauncher.exe 2448 stoverlauncher.exe 1480 stoverlauncher.exe 2176 stoverlauncher.exe 4032 stoverlauncher.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
stoverlauncher.exestoverlauncher.exestoverlauncher.exedescription pid Process procid_target PID 224 set thread context of 2532 224 stoverlauncher.exe 85 PID 2448 set thread context of 1480 2448 stoverlauncher.exe 94 PID 2176 set thread context of 4032 2176 stoverlauncher.exe 99 -
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2784 2532 WerFault.exe 85 4380 2532 WerFault.exe 85 2976 1480 WerFault.exe 94 2092 4032 WerFault.exe 99 3220 4032 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
stoverlauncher.exestoverlauncher.exestoverlauncher.exestoverlauncher.exestoverlauncher.exestoverlauncher.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stoverlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stoverlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stoverlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stoverlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stoverlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stoverlauncher.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid Process 3684 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exedescription pid Process Token: SeRestorePrivilege 3684 7zFM.exe Token: 35 3684 7zFM.exe Token: SeSecurityPrivilege 3684 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid Process 3684 7zFM.exe 3684 7zFM.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
stoverlauncher.exestoverlauncher.exestoverlauncher.exedescription pid Process procid_target PID 224 wrote to memory of 1636 224 stoverlauncher.exe 84 PID 224 wrote to memory of 1636 224 stoverlauncher.exe 84 PID 224 wrote to memory of 1636 224 stoverlauncher.exe 84 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 224 wrote to memory of 2532 224 stoverlauncher.exe 85 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2448 wrote to memory of 1480 2448 stoverlauncher.exe 94 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99 PID 2176 wrote to memory of 4032 2176 stoverlauncher.exe 99
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Stover Launcher.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3684
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3372
-
C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"2⤵
- Executes dropped EXE
PID:1636
-
-
C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 14723⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 14443⤵
- Program crash
PID:4380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2532 -ip 25321⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2532 -ip 25321⤵PID:3248
-
C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 13003⤵
- Program crash
PID:2976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1480 -ip 14801⤵PID:3416
-
C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"C:\Users\Admin\Desktop\Stover Launcher\stoverlauncher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 14363⤵
- Program crash
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 14643⤵
- Program crash
PID:3220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4032 -ip 40321⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4032 -ip 40321⤵PID:3164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD551397005ac7db572e3af109699f4ba73
SHA1c9bcb56dd1a4c4b687917aac34f703908a5d4bde
SHA25607bd44748b663d9efbf35cd962408b57ad72a7ce65bdc2722db284f343b2d891
SHA512512740d00adf5512cd8f6ca163a1c137a0e17091243d880271945b90306f7ddc6b47928b27985c5b60b4474e5be57273308babe50986fda638dc6b8ea2f0f2c8
-
Filesize
5.0MB
MD57bfe885d87026d0d41dba5fb4173201c
SHA1027637e1c7fd24a7bbaba6b926cce67e47d8e7dc
SHA2562b529e8afa002053744bb4e2430513e7745f91b5052446ef2d0568e91d5b1280
SHA512d2ded5d1c216900e340425f652c585398f2662f3aefe552e80161af90d1656d2ed202366c2ac794564dbf6eca0c1d769f62fcb979a0d666ea06540e389a30951
-
Filesize
461KB
MD5c30aa30a660900e46d016f3a69b14cbe
SHA1e3ea76add08a924c1dd0abf7987bd531526c73e9
SHA25633a4c64a0b43b2732fb8d0be63088b86b6d24288a0c716e382e76e591e856041
SHA5120230e57ff6c7dd1763d9ef618b615014125ac497b2bad03746827f59a56d28a9c81a9aefefe0001a7cdf163e335b0e42e6c41ec13147b0e0fa134c537ce0c0fc