Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 07:27
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20241010-en
General
-
Target
Installer.exe
-
Size
26.6MB
-
MD5
d865604715daec772b3c7bc86cf6cb2c
-
SHA1
8b34c442dda04930bf535275b5926c06584d0643
-
SHA256
d097246fca01b72e58cd7ce0ad35bf8e3f517508a9e320d063ae7089ef98517a
-
SHA512
b0c296302030470d30a5f3327e5cfb0a0745727d8343d75c71a28243d956763d8f8a629c084d4aa6bf5c949874272fff168994f695090785bc0d4aa904eb0e06
-
SSDEEP
196608:ZJCc+/wmeML2XJ+eTcbn7qAcfM8jFGL0w3Fk:Zd+/wcL2X4eO7wbGL00Fk
Malware Config
Extracted
lumma
https://quialitsuzoxm.shop/api
https://complaintsipzzx.shop/api
https://languagedscie.shop/api
https://mennyudosirso.shop/api
https://bassizcellskz.shop/api
https://deallerospfosu.shop/api
https://writerospzm.shop/api
https://celebratioopz.shop/api
https://solutionpxmuzo.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1888 set thread context of 716 1888 Installer.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1888 wrote to memory of 716 1888 Installer.exe 89 PID 1888 wrote to memory of 716 1888 Installer.exe 89 PID 1888 wrote to memory of 716 1888 Installer.exe 89 PID 1888 wrote to memory of 716 1888 Installer.exe 89 PID 1888 wrote to memory of 716 1888 Installer.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:716
-