Overview
overview
10Static
static
7frhasdtr.exe
windows7-x64
10frhasdtr.exe
windows10-2004-x64
10lumma.exe
windows7-x64
10lumma.exe
windows10-2004-x64
10picturefonts.exe
windows7-x64
7picturefonts.exe
windows10-2004-x64
7rundll.exe
windows7-x64
1rundll.exe
windows10-2004-x64
10setup.exe
windows7-x64
7setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 03:37
Behavioral task
behavioral1
Sample
frhasdtr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
frhasdtr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lumma.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
lumma.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
picturefonts.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
picturefonts.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
rundll.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
rundll.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
setup.exe
Resource
win7-20240708-en
General
-
Target
setup.exe
-
Size
6.8MB
-
MD5
acb755d083c876f6a80105c17cc61754
-
SHA1
8ccfc2b30402e76a59ed07873b0ccf589728fd22
-
SHA256
b94bcdf5d6b9f1eb6abe97090993e8c4f66b514dd9c51193f16673e842253d86
-
SHA512
2d26da0b24c61e05a66583b548672f00b4351c87669fb8b7e4e71a73da4a2c0e470d7c6aa8072976fe8ca2ac5ea6b75e41f54b426c0d1de06aa118a83283b70b
-
SSDEEP
196608:DzSpVt4hhiIbZg4T4hac7p6eDcGRY9Dc+/7/MS6a:DWp74hVbehacQeHwDc+/7zb
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2544 setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2544 2368 setup.exe 30 PID 2368 wrote to memory of 2544 2368 setup.exe 30 PID 2368 wrote to memory of 2544 2368 setup.exe 30 PID 2368 wrote to memory of 2544 2368 setup.exe 30 PID 2368 wrote to memory of 2544 2368 setup.exe 30 PID 2368 wrote to memory of 2544 2368 setup.exe 30 PID 2368 wrote to memory of 2544 2368 setup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD584741db3367d6998108d22e03eaf2a71
SHA16564ab918223d0074dfbf9bc5d062fd3a2003079
SHA2563e0c22d1451c3f3578850990f54916eb276bb45b951649d6478523566dfa8059
SHA5121a6aa94ec97df73b23b0d5079bafa92c13f9786f5c488046e95804f4701baeecb1beb9fd96824a6009355321adb7319ac643af40ff0c6b01733050dab2b648c0