Resubmissions
04-01-2025 01:01
250104-bdpptaspd1 1004-01-2025 00:57
250104-ba6h6avmhp 1004-01-2025 00:49
250104-a6k2navkhr 1004-01-2025 00:42
250104-a2lgmavjbp 1004-01-2025 00:36
250104-ax6a8s1rcz 1004-01-2025 00:31
250104-avh3xs1qa1 1004-01-2025 00:29
250104-asx43a1pdw 1004-01-2025 00:25
250104-aq52wstnbk 10Analysis
-
max time kernel
13s -
max time network
8s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-01-2025 00:25
Static task
static1
General
-
Target
Loader.exe
-
Size
381KB
-
MD5
e37c6fb17af3c80377cf78f861c0bd80
-
SHA1
9b7a465d5e118453b794e577d01d0865b54ee663
-
SHA256
9c4b510c6b65c6fa54a2308b743ecb89dcbd44e9d039c890dc32c75ccf1538e8
-
SHA512
623e51f357d4fc054421f817931914dba0cc5bb92ca771f00376c4824d5366972b76c2efce6cfd284331f05008813ebfb1d75e4ea72fd92eab4ae3df9714b88e
-
SSDEEP
6144:72pwktDrDuMtoAAAySseHfMM/rE3jaIgHT2nC0osguHJL4jG9vKNfuCIO4+hQ3PC:L4C/AFseHEj+IgHTTOg8LDyNijZkZETm
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2236 set thread context of 3116 2236 Loader.exe 78 PID 2236 set thread context of 4872 2236 Loader.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 1692 2236 WerFault.exe 76 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3184 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3184 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe 3184 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3184 vlc.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2236 wrote to memory of 3116 2236 Loader.exe 78 PID 2236 wrote to memory of 3116 2236 Loader.exe 78 PID 2236 wrote to memory of 3116 2236 Loader.exe 78 PID 2236 wrote to memory of 3116 2236 Loader.exe 78 PID 2236 wrote to memory of 3116 2236 Loader.exe 78 PID 2236 wrote to memory of 3116 2236 Loader.exe 78 PID 2236 wrote to memory of 3116 2236 Loader.exe 78 PID 2236 wrote to memory of 3116 2236 Loader.exe 78 PID 2236 wrote to memory of 3116 2236 Loader.exe 78 PID 2236 wrote to memory of 564 2236 Loader.exe 79 PID 2236 wrote to memory of 564 2236 Loader.exe 79 PID 2236 wrote to memory of 564 2236 Loader.exe 79 PID 2236 wrote to memory of 4872 2236 Loader.exe 80 PID 2236 wrote to memory of 4872 2236 Loader.exe 80 PID 2236 wrote to memory of 4872 2236 Loader.exe 80 PID 2236 wrote to memory of 4872 2236 Loader.exe 80 PID 2236 wrote to memory of 4872 2236 Loader.exe 80 PID 2236 wrote to memory of 4872 2236 Loader.exe 80 PID 2236 wrote to memory of 4872 2236 Loader.exe 80 PID 2236 wrote to memory of 4872 2236 Loader.exe 80 PID 2236 wrote to memory of 4872 2236 Loader.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3116
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 8162⤵
- Program crash
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2236 -ip 22361⤵PID:4432
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnlockAssert.mpeg2"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3184