Analysis
-
max time kernel
97s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 06:10
Static task
static1
Behavioral task
behavioral1
Sample
Mod Menu v3.1.zip
Resource
win7-20240903-en
General
-
Target
Mod Menu v3.1.zip
-
Size
9.1MB
-
MD5
df580c685c09a86e2698cbdf608d247c
-
SHA1
7b125d9f45efb1ebb8f220dc83b71fbe3be4baf3
-
SHA256
d03820b304f0a79c3778e60b9e9d561f8080525974b66dd62f9de3c8dceebfac
-
SHA512
8740e3dcb7e5ef36a8450f414b0a98e4ff13c46dfae2e26aa7ed8e8b9a9cfb65d02a6a41b773ffe22d11965d7d6cfad1eceddf3e53659c640edfe5f0fb301ed4
-
SSDEEP
196608:7HELCspPA/uddApsMU4l3PQ4esfBWGygdOGV:74I3sH4l4LklOGV
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 6 IoCs
pid Process 3140 Loader.exe 5100 Loader.exe 4020 Loader.exe 1344 Loader.exe 424 Loader.exe 1084 Loader.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3140 set thread context of 5100 3140 Loader.exe 97 PID 4020 set thread context of 1344 4020 Loader.exe 100 PID 424 set thread context of 1084 424 Loader.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3972 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3972 7zFM.exe Token: 35 3972 7zFM.exe Token: SeSecurityPrivilege 3972 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3972 7zFM.exe 3972 7zFM.exe 3972 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 400 OpenWith.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3140 wrote to memory of 5100 3140 Loader.exe 97 PID 3140 wrote to memory of 5100 3140 Loader.exe 97 PID 3140 wrote to memory of 5100 3140 Loader.exe 97 PID 3140 wrote to memory of 5100 3140 Loader.exe 97 PID 3140 wrote to memory of 5100 3140 Loader.exe 97 PID 3140 wrote to memory of 5100 3140 Loader.exe 97 PID 3140 wrote to memory of 5100 3140 Loader.exe 97 PID 3140 wrote to memory of 5100 3140 Loader.exe 97 PID 3140 wrote to memory of 5100 3140 Loader.exe 97 PID 4020 wrote to memory of 1344 4020 Loader.exe 100 PID 4020 wrote to memory of 1344 4020 Loader.exe 100 PID 4020 wrote to memory of 1344 4020 Loader.exe 100 PID 4020 wrote to memory of 1344 4020 Loader.exe 100 PID 4020 wrote to memory of 1344 4020 Loader.exe 100 PID 4020 wrote to memory of 1344 4020 Loader.exe 100 PID 4020 wrote to memory of 1344 4020 Loader.exe 100 PID 4020 wrote to memory of 1344 4020 Loader.exe 100 PID 4020 wrote to memory of 1344 4020 Loader.exe 100 PID 424 wrote to memory of 1084 424 Loader.exe 103 PID 424 wrote to memory of 1084 424 Loader.exe 103 PID 424 wrote to memory of 1084 424 Loader.exe 103 PID 424 wrote to memory of 1084 424 Loader.exe 103 PID 424 wrote to memory of 1084 424 Loader.exe 103 PID 424 wrote to memory of 1084 424 Loader.exe 103 PID 424 wrote to memory of 1084 424 Loader.exe 103 PID 424 wrote to memory of 1084 424 Loader.exe 103 PID 424 wrote to memory of 1084 424 Loader.exe 103
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Mod Menu v3.1.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3972
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3700
-
C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5100
-
-
C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1344
-
-
C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"C:\Users\Admin\Desktop\Mod Menu v3.1\Loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:400
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Mod Menu v3.1\updater.ini1⤵PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
797KB
MD5c3cc4c8de64966fac02439d06d9db0b3
SHA174782cbd2a26bb52316f4aec515769491128cb10
SHA2561d6ef55eb647dcc14c81ac16525c1c6ad90a35d169f743ff6155821b4c86ad92
SHA512594277fea70474511ccca986d0e8af3b84c4079cccd0831ac5ce32a1ce1c75597bb81a448b307782379f30a4ee170b49c2d0c50dafb192c6676404004db67a01
-
Filesize
4.3MB
MD57641e39b7da4077084d2afe7c31032e0
SHA12256644f69435ff2fee76deb04d918083960d1eb
SHA25644422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47
SHA5128010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5
-
Filesize
3.6MB
MD5971543b2412541a890ec173524db2ccf
SHA10e49b25e0dc320a85d3c11908a444779695501f5
SHA2562096cacb59cb1bcf9605e4d6897e02007e06f2cf1ace4cda961c0ae2b57fc8aa
SHA512bf1c9677f32c24a64d058f6d42f4d65c5d52c94777513b3f7793e62fb974209891881d0d437aeba20a75d4aac1096e1205baa631d98e038ade5f42500e752bed