Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 07:40
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
General
-
Target
Setup.exe
-
Size
500KB
-
MD5
23b1cc3633283ddc53079bfe24400e77
-
SHA1
b05b9c023811879baf9bfdebd84f87cd592cb586
-
SHA256
90e92ea3890eb56cd18543a15d1fe4d9abbb57a974451b52db7b6ec58de272b4
-
SHA512
246fe47462507e2fe911ed85648ea5bd6199f46be94dfbd8f9b7b7f097fde93ba9f81186a5c919423f92e405d69f5cfb42a57c337d6c9160136c19f23e11f66d
-
SSDEEP
12288:zztE0u86qlmk/tFsgMH+GsGde1vy0xt4K7wa07N:zO0uYlmsRMH4Koqqo7N
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1864 set thread context of 4036 1864 Setup.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1864 wrote to memory of 4036 1864 Setup.exe 83 PID 1864 wrote to memory of 4036 1864 Setup.exe 83 PID 1864 wrote to memory of 4036 1864 Setup.exe 83 PID 1864 wrote to memory of 4036 1864 Setup.exe 83 PID 1864 wrote to memory of 4036 1864 Setup.exe 83 PID 1864 wrote to memory of 4036 1864 Setup.exe 83 PID 1864 wrote to memory of 4036 1864 Setup.exe 83 PID 1864 wrote to memory of 4036 1864 Setup.exe 83 PID 1864 wrote to memory of 4036 1864 Setup.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4036
-