Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 19:57
Static task
static1
Behavioral task
behavioral1
Sample
✺⇉Δ†ε$†✺$ε†μρ✺Unℓ◎ck Kε¥✺{9192}✺⇉-A/Setup.exe
Resource
win7-20240903-en
General
-
Target
✺⇉Δ†ε$†✺$ε†μρ✺Unℓ◎ck Kε¥✺{9192}✺⇉-A/Setup.exe
-
Size
31KB
-
MD5
67dedab5bc0159f7cc61cb4b46daa6f1
-
SHA1
5d57ef4bd9b6ac672c413c5e8495263672f090e3
-
SHA256
0e6f5eaa2cd91747213f6aec05e3de6fb46ea2b7cf4d5f3ac267128abc784d00
-
SHA512
4c7ed5d6e0a76ac6eec79e50ae9cd4b5fe3eacda574606e47d85bba1739902d688aa6f5ec03e7863ec9d36bdadf6229f64bce8fe33bacf38e84e50332a30caf0
-
SSDEEP
768:MEH9SEBh8GdMrawYnZO44H2ekz/5Z+MMcS:M8RdMXYnZO4Y2ekT5Zgc
Malware Config
Extracted
lumma
https://servicedny.site/api
https://authorisev.site/api
https://faulteyotk.site/api
https://dilemmadu.site/api
https://contemteny.site/api
https://goalyfeastz.site/api
https://opposezmny.site/api
https://seallysl.site/api
https://intentiongi.cyou/api
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 2136 nc.exe 1236 Process not Found -
Loads dropped DLL 4 IoCs
pid Process 2444 Setup.exe 1236 Process not Found 2760 more.com 2640 AutoIt3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2444 set thread context of 2760 2444 Setup.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoIt3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2444 Setup.exe 2444 Setup.exe 2760 more.com 2760 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2444 Setup.exe 2760 more.com -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2136 2444 Setup.exe 31 PID 2444 wrote to memory of 2136 2444 Setup.exe 31 PID 2444 wrote to memory of 2136 2444 Setup.exe 31 PID 2444 wrote to memory of 2136 2444 Setup.exe 31 PID 2444 wrote to memory of 2760 2444 Setup.exe 32 PID 2444 wrote to memory of 2760 2444 Setup.exe 32 PID 2444 wrote to memory of 2760 2444 Setup.exe 32 PID 2444 wrote to memory of 2760 2444 Setup.exe 32 PID 2444 wrote to memory of 2760 2444 Setup.exe 32 PID 2760 wrote to memory of 2640 2760 more.com 34 PID 2760 wrote to memory of 2640 2760 more.com 34 PID 2760 wrote to memory of 2640 2760 more.com 34 PID 2760 wrote to memory of 2640 2760 more.com 34 PID 2760 wrote to memory of 2640 2760 more.com 34 PID 2760 wrote to memory of 2640 2760 more.com 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\✺⇉Δ†ε$†✺$ε†μρ✺Unℓ◎ck Kε¥✺{9192}✺⇉-A\Setup.exe"C:\Users\Admin\AppData\Local\Temp\✺⇉Δ†ε$†✺$ε†μρ✺Unℓ◎ck Kε¥✺{9192}✺⇉-A\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\danc\VKNBHZTFWAYNAFU\nc.exeC:\Users\Admin\AppData\Roaming\danc\VKNBHZTFWAYNAFU\nc.exe2⤵
- Executes dropped EXE
PID:2136
-
-
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\AutoIt3.exeC:\Users\Admin\AppData\Local\Temp\AutoIt3.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD52b14c105d08f63750e939d70fc68e3af
SHA1010907566b1f23ba8566f1973a8a2a5fa919f7a6
SHA25695c18f788b80ed53eed4bec76f539438284344523bdc1d01598353685ad2f0cb
SHA5129936e0fa7342422b75fbee961002cbd950d0ca6811d335fa69ef1f9ce41d5f128b63e0878dadbcbd37ee5e0362406a33b4d7eeafd88fab62b94208ae84e3c0c3
-
Filesize
285KB
MD57fb44c5bca4226d8aab7398e836807a2
SHA147128e4f8afabfde5037ed0fcaba8752c528ff52
SHA256a64ead73c06470bc5c84cfc231b0723d70d29fec7d385a268be2c590dc5eb1ef
SHA512f0bd093f054c99bcc50df4005d0190bd7e3dcefea7008ae4c9b67a29e832e02ae9ff39fa75bc1352c127aeb13afdea9bfdcc238ac826ef17f288d6fbd2ec8cab
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634