Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20241023-en
General
-
Target
Setup.exe
-
Size
651.4MB
-
MD5
8604e4bdf9de6a0ae82aa30e6bb5841e
-
SHA1
8535e889bc6a0757274081e52fdab90ea2090ae6
-
SHA256
27196952aca14c796138426eb8f52b0ddafc9f46d0e4c10f750cfee95bf5132c
-
SHA512
8a0d003df564bedd3b748955b2b2efd6079d03b73ea56ff6e3bb77fd8f54c500e683107fdc64d4df71dfcba90b275066b3d627422bef0a217dbbcfffc5b00ebe
-
SSDEEP
196608:ZAa/L5xk1ABsdnCdTy9w6wzWvnP4O7NADtV6v+4cU9UryCjh9WmilQDpMVo0hnXy:j/L50mq9w6hvX7
Malware Config
Extracted
lumma
https://reinfomarbke.site/api
https://monopuncdz.site/api
https://unityshootsz.site/api
https://moeventmynz.site/api
https://plaintifuf.site/api
https://honerstyzu.site/api
https://bringlanejk.site/api
https://uppermixturyz.site/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1484 set thread context of 2008 1484 Setup.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SearchIndexer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1484 Setup.exe 1484 Setup.exe 2008 choice.exe 2008 choice.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1484 Setup.exe 2008 choice.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1484 Setup.exe 1484 Setup.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2008 1484 Setup.exe 31 PID 1484 wrote to memory of 2008 1484 Setup.exe 31 PID 1484 wrote to memory of 2008 1484 Setup.exe 31 PID 1484 wrote to memory of 2008 1484 Setup.exe 31 PID 1484 wrote to memory of 2008 1484 Setup.exe 31 PID 2008 wrote to memory of 2852 2008 choice.exe 33 PID 2008 wrote to memory of 2852 2008 choice.exe 33 PID 2008 wrote to memory of 2852 2008 choice.exe 33 PID 2008 wrote to memory of 2852 2008 choice.exe 33 PID 2008 wrote to memory of 2852 2008 choice.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\choice.exeC:\Windows\SysWOW64\choice.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\SearchIndexer.exeC:\Windows\SysWOW64\SearchIndexer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5c3df93ace33743680e80ae11c9a3b003
SHA1cf54f6ccd41c963e7f6cb851f7290724b1442fff
SHA2565b602014cdddaa2600d953b12dfb86b2d9dce1f15aab11b9efded56b8ce602fe
SHA512d4a5294be64f564527f73a73acb4194992a97d6af8186fa292f64b3a0911d7f665e7c16f5e7414f55fd7e3f1639e5140816a7139ab923e14732c15e91179f3b3
-
Filesize
1020KB
MD5764a8262705be7bdd396df544fbf1ef7
SHA11bfa0109b025c3002df46719893fb4e04bfab251
SHA256035efec524afbf21ee31693ac75e76688f0cb2266bf9f1cb6ee3047fe3b5205c
SHA512616b281395518be7b4a3a90f5cab3e1b93297df50fa6fda4227c2cc0b6ce64e7c641532b642f49b7aed9aa6732c95edd882e59030feb6504b1457890fc51f40f