Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
Meta.exe
Resource
win7-20241010-en
General
-
Target
Meta.exe
-
Size
801KB
-
MD5
11befa4a6fead081c7735678502a652c
-
SHA1
cbe77cbb82ef39b9296c63653248e1d61242556f
-
SHA256
6b26bc7f5a3375c1bb028f64838937298a74fe462d6f0b68e00b8049971d305b
-
SHA512
4622830785a83a50943131e35d438e2b12ad0f37443bc3ae51f97e8b1406be044c31fdefa29dadec08feb796052ac9f5afd53674042af48182242b8c2f9e94ca
-
SSDEEP
12288:ou4dP5M4Q2MmbFsgMH+GsGde1vy0xt4K7wa47DFsgMH+GsGde1vy0xt4K7wa47N:t4dPpQPmPMH4KoqqE7nMH4KoqqE7N
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 3320 2372 Meta.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Meta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Meta.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3320 2372 Meta.exe 86 PID 2372 wrote to memory of 3320 2372 Meta.exe 86 PID 2372 wrote to memory of 3320 2372 Meta.exe 86 PID 2372 wrote to memory of 3320 2372 Meta.exe 86 PID 2372 wrote to memory of 3320 2372 Meta.exe 86 PID 2372 wrote to memory of 3320 2372 Meta.exe 86 PID 2372 wrote to memory of 3320 2372 Meta.exe 86 PID 2372 wrote to memory of 3320 2372 Meta.exe 86 PID 2372 wrote to memory of 3320 2372 Meta.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Meta.exe"C:\Users\Admin\AppData\Local\Temp\Meta.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Meta.exe"C:\Users\Admin\AppData\Local\Temp\Meta.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3320
-