Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
X-mas_2.3.2.exe
Resource
win7-20240729-en
General
-
Target
X-mas_2.3.2.exe
-
Size
318KB
-
MD5
3dfd44f9df3a6c7b1d20a12a20ba0c67
-
SHA1
a0fb2858b35965912b61b82cb575590bb5a401c7
-
SHA256
a1378c290f4fa41011aed872439a21dba2604a9b1e48a53bcc518d4d101d4da8
-
SHA512
be4acb1c27848e5cfaffa6d662e4515913530801f01504fccb9a8002c92d9a0ec9d80028e0803bf5fee92c801323ac5492167dff226461551407b938dbff77e1
-
SSDEEP
6144:TrKgLPGKlEi1dSEdDNN5LC/hNTYTFzZHzvXJmrzJpBtaAuGRxhGaq:TrFLdlEijSEddG/7cVZTkRtaAuGRxhA
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://begguinnerz.biz/api
Extracted
lumma
https://begguinnerz.biz/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Program crash 1 IoCs
pid pid_target Process procid_target 1092 1476 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X-mas_2.3.2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\X-mas_2.3.2.exe"C:\Users\Admin\AppData\Local\Temp\X-mas_2.3.2.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 8362⤵
- Program crash
PID:1092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1476 -ip 14761⤵PID:2136