Analysis
-
max time kernel
97s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
Update_1.65.4 (1).msi
Resource
win7-20241023-en
General
-
Target
Update_1.65.4 (1).msi
-
Size
9.5MB
-
MD5
d330c09503e6c3d51cd2d3435de0795a
-
SHA1
5b7bbf5bc80f4b3863c263d1aed620faa4612c9d
-
SHA256
fbccc8952710a8a50655f4fe3a880c8373411b7ec40e54aabd7eaff3f1d0137b
-
SHA512
ed3abd52e47d36ca3637dbf3d738d6509049162dd3f084dc7b9c286f517be815c6825df2c1070f36ac4e4445e62919c44a37793fc4bc0761076608340c35610e
-
SSDEEP
196608:0uVUeJYJMd0rWLhjx5YHU+tYERMN2fr/pa/3pqnLtAPLMgzWS3W9i4EzP:lV6WLR+tYiyURmpML6DMgzJsc
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 4620 1680 ReFB.exe 103 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{C4AD535D-D136-4F91-8948-3E2C33960630} msiexec.exe File opened for modification C:\Windows\Installer\MSIDAC0.tmp msiexec.exe File created C:\Windows\Installer\e57d9e7.msi msiexec.exe File created C:\Windows\Installer\e57d9e5.msi msiexec.exe File opened for modification C:\Windows\Installer\e57d9e5.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 2280 ReFB.exe 1680 ReFB.exe -
Loads dropped DLL 13 IoCs
pid Process 2280 ReFB.exe 2280 ReFB.exe 2280 ReFB.exe 2280 ReFB.exe 2280 ReFB.exe 2280 ReFB.exe 1680 ReFB.exe 1680 ReFB.exe 1680 ReFB.exe 1680 ReFB.exe 1680 ReFB.exe 1680 ReFB.exe 1680 ReFB.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReFB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReFB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4324 msiexec.exe 4324 msiexec.exe 2280 ReFB.exe 1680 ReFB.exe 1680 ReFB.exe 1680 ReFB.exe 4620 cmd.exe 4620 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1680 ReFB.exe 4620 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4884 msiexec.exe Token: SeIncreaseQuotaPrivilege 4884 msiexec.exe Token: SeSecurityPrivilege 4324 msiexec.exe Token: SeCreateTokenPrivilege 4884 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4884 msiexec.exe Token: SeLockMemoryPrivilege 4884 msiexec.exe Token: SeIncreaseQuotaPrivilege 4884 msiexec.exe Token: SeMachineAccountPrivilege 4884 msiexec.exe Token: SeTcbPrivilege 4884 msiexec.exe Token: SeSecurityPrivilege 4884 msiexec.exe Token: SeTakeOwnershipPrivilege 4884 msiexec.exe Token: SeLoadDriverPrivilege 4884 msiexec.exe Token: SeSystemProfilePrivilege 4884 msiexec.exe Token: SeSystemtimePrivilege 4884 msiexec.exe Token: SeProfSingleProcessPrivilege 4884 msiexec.exe Token: SeIncBasePriorityPrivilege 4884 msiexec.exe Token: SeCreatePagefilePrivilege 4884 msiexec.exe Token: SeCreatePermanentPrivilege 4884 msiexec.exe Token: SeBackupPrivilege 4884 msiexec.exe Token: SeRestorePrivilege 4884 msiexec.exe Token: SeShutdownPrivilege 4884 msiexec.exe Token: SeDebugPrivilege 4884 msiexec.exe Token: SeAuditPrivilege 4884 msiexec.exe Token: SeSystemEnvironmentPrivilege 4884 msiexec.exe Token: SeChangeNotifyPrivilege 4884 msiexec.exe Token: SeRemoteShutdownPrivilege 4884 msiexec.exe Token: SeUndockPrivilege 4884 msiexec.exe Token: SeSyncAgentPrivilege 4884 msiexec.exe Token: SeEnableDelegationPrivilege 4884 msiexec.exe Token: SeManageVolumePrivilege 4884 msiexec.exe Token: SeImpersonatePrivilege 4884 msiexec.exe Token: SeCreateGlobalPrivilege 4884 msiexec.exe Token: SeBackupPrivilege 3524 vssvc.exe Token: SeRestorePrivilege 3524 vssvc.exe Token: SeAuditPrivilege 3524 vssvc.exe Token: SeBackupPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe Token: SeTakeOwnershipPrivilege 4324 msiexec.exe Token: SeRestorePrivilege 4324 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4884 msiexec.exe 4884 msiexec.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4324 wrote to memory of 3840 4324 msiexec.exe 96 PID 4324 wrote to memory of 3840 4324 msiexec.exe 96 PID 4324 wrote to memory of 2280 4324 msiexec.exe 98 PID 4324 wrote to memory of 2280 4324 msiexec.exe 98 PID 4324 wrote to memory of 2280 4324 msiexec.exe 98 PID 2280 wrote to memory of 1680 2280 ReFB.exe 100 PID 2280 wrote to memory of 1680 2280 ReFB.exe 100 PID 2280 wrote to memory of 1680 2280 ReFB.exe 100 PID 1680 wrote to memory of 4620 1680 ReFB.exe 103 PID 1680 wrote to memory of 4620 1680 ReFB.exe 103 PID 1680 wrote to memory of 4620 1680 ReFB.exe 103 PID 1680 wrote to memory of 4620 1680 ReFB.exe 103 PID 4620 wrote to memory of 4992 4620 cmd.exe 108 PID 4620 wrote to memory of 4992 4620 cmd.exe 108 PID 4620 wrote to memory of 4992 4620 cmd.exe 108 PID 4620 wrote to memory of 4992 4620 cmd.exe 108 PID 4620 wrote to memory of 4992 4620 cmd.exe 108 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Update_1.65.4 (1).msi"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4884
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3840
-
-
C:\Users\Admin\AppData\Local\Forfeiture\ReFB.exe"C:\Users\Admin\AppData\Local\Forfeiture\ReFB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\readertask_4\ReFB.exeC:\Users\Admin\AppData\Roaming\readertask_4\ReFB.exe3⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD57feb27f41d591ce2049bcc8dacede4f0
SHA120f4604a73cdcbde3d0b295a09d242de605f644a
SHA2569d763fddd600ca69549d4a87bc117f982e9af26c832315fb7695cecdb6286a45
SHA51232c66e6132fc420fa8cc4cb1dcffb90acbc8de945be28dfb03202eb5538a3e8aafd261b343203ae2fba986e62558151cb41555fc845d02d1191c29bca6c9b3d0
-
Filesize
2.5MB
MD5fecc62a37d37d9759e6b02041728aa23
SHA10c5f646caef7a6e9073d58ed698f6cfbfb2883a3
SHA25694c1395153d7758900979351e633ab68d22ae9b306ef8e253b712a1aab54c805
SHA512698f90f1248dacbd4bdc49045a4e80972783d9dcec120d187abd08f5ef03224b511f7870320938b7e8be049c243ffb1c450c847429434ef2e2c09288cb9286a6
-
Filesize
8.2MB
MD5831ba3a8c9d9916bdf82e07a3e8338cc
SHA16c89fd258937427d14d5042736fdfccd0049f042
SHA256d2c8c8b6cc783e4c00a5ef3365457d776dfc1205a346b676915e39d434f5a52d
SHA512beda57851e0e3781ece1d0ee53a3f86c52ba99cb045943227b6c8fc1848a452269f2768bf4c661e27ddfbe436df82cfd1de54706d814f81797a13fefec4602c5
-
Filesize
1.0MB
MD58a2e025fd3ddd56c8e4f63416e46e2ec
SHA15f58feb11e84aa41d5548f5a30fc758221e9dd64
SHA25652ae07d1d6a467283055a3512d655b6a43a42767024e57279784701206d97003
SHA5128e3a449163e775dc000e9674bca81ffabc7fecd9278da5a40659620cfc9cc07f50cc29341e74176fe10717b2a12ea3d5148d1ffc906bc809b1cd5c8c59de7ba1
-
Filesize
12.5MB
MD5e75606f270507c11094945e46a0a87b0
SHA1cd0b160c96f2124ab2d92847bc80739f813f76e6
SHA2560148dd8159d46463ad5c5b51dfe23e2cc16b7b08a1c057708f573684c00ddde9
SHA512ee0cb735ac2cd82cfa524799b172100773996620f1a62d655b5d6a83f2e09034ca233988303660ad2a01d8ac45f456a0e3c41539f6b8b21eccbe043917362ecc
-
Filesize
80KB
MD52a8613b7d99903516b8fe02fd820bf52
SHA178a96addcb556ab1d490fac80f929305263d06b9
SHA256f1d68c5e7c7660d4f2ce412c109b7fe3e088872fa0ebe61ca9ab9dd92a496407
SHA512af0902aeb6169ea507b787da7b61c3533df4610c3f51c1d8f65dfc9008c8ce2580f2d86a49a4d0acc2c51c731f3e4c447d0d1d8e779dc1c75e43d30b79c46436
-
Filesize
57KB
MD5d1cc8a9122a2a717629f1a324610336c
SHA13329d052b890a577df9f77093a05643e545cb533
SHA256623bc1dba626d13257b8bd2308dd1a268c5cf7a63d0bc25125045bac40052182
SHA512a0bba719434f61e44c3055d97a5abcfd8ecb3ac51534d1e8bc1ccb04c29ecae60ee1ef37156d41ef5cc3447d5bda9be5329e17320e09ccd7679c045866054ea9
-
Filesize
775KB
MD514116b49d2c306be3a5b16c0bface12e
SHA16c6fef088b4710f16d1098697dd9eeaa114bfab2
SHA25617461e0f93ddf32026931fbfe7717368bcba30e660674b4a96d388e3bd8059cc
SHA512c92a70bb66b32980ed324eb2848c63566e7d90f1050b2c21197ac0c40d3e4986f529a9455e4ef8c26da35cb89d9533af59ffc323c1b10bb3895b1d11c2f61aed
-
Filesize
411KB
MD503e9314004f504a14a61c3d364b62f66
SHA10aa3caac24fdf9d9d4c618e2bbf0a063036cd55d
SHA256a3ba6421991241bea9c8334b62c3088f8f131ab906c3cc52113945d05016a35f
SHA5122fcff4439d2759d93c57d49b24f28ae89b7698e284e76ac65fe2b50bdefc23a8cc3c83891d671de4e4c0f036cef810856de79ac2b028aa89a895bf35abff8c8d
-
Filesize
752KB
MD567ec459e42d3081dd8fd34356f7cafc1
SHA11738050616169d5b17b5adac3ff0370b8c642734
SHA2561221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067
SHA5129ed1c106df217e0b4e4fbd1f4275486ceba1d8a225d6c7e47b854b0b5e6158135b81be926f51db0ad5c624f9bd1d09282332cf064680dc9f7d287073b9686d33
-
Filesize
1014KB
MD53fe78bb82fabccc4f15cd872fd3cc6be
SHA1de69ecd9909adf05325ccb19f9ff6a4b1dac0f26
SHA256ff42280a841b4c3531639f6d3aa88748c2f2154a44a6e7d10a192435a54775e1
SHA512f42115598d2a7e40fa069cce37855a597c792835ec72195ffe38e180d8c443f6ef125b6e1a86fc5e0abf537bf781055bc7046b4a18158c3e3e2c1b6d90bbea73
-
Filesize
9.5MB
MD5d330c09503e6c3d51cd2d3435de0795a
SHA15b7bbf5bc80f4b3863c263d1aed620faa4612c9d
SHA256fbccc8952710a8a50655f4fe3a880c8373411b7ec40e54aabd7eaff3f1d0137b
SHA512ed3abd52e47d36ca3637dbf3d738d6509049162dd3f084dc7b9c286f517be815c6825df2c1070f36ac4e4445e62919c44a37793fc4bc0761076608340c35610e
-
Filesize
24.1MB
MD5140c50b3a2026c75373832ba3b63a39c
SHA1386a9d144094c07baa683bc964160ea89b4fa1a7
SHA256e2372f37f9c9942654f75726b197f5327244992efdb00906749d43f41de17e9d
SHA5126444829f494effe619909a02714fdc0a52138ac5a900c6b26b1082b0141c3dde519ea006f9ec81b2372fca606ca5a0d1bccb50e7866476f541851448ce3b77cf
-
\??\Volume{77a2731a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{45366059-ca77-4bd8-8bc7-b01dcdb76348}_OnDiskSnapshotProp
Filesize6KB
MD5aeffc6227cd8c154f9a93f9ef02c9603
SHA1c576da1dc5c68ccbca66de60e26b3ad9a21f7da4
SHA256873ebf1c39f94bebf275f6935cbfaa4e78a1d16d67a658b3af6e9f79edb2720b
SHA512c6c2742a7486491033336e6adac40046281a1e0c665930140a6d9fdb7948e7def70c88ad06db36c2541a905c16367f3447f873133050ee4b05239dea60ca17ff