Resubmissions
04-01-2025 01:01
250104-bdpptaspd1 1004-01-2025 00:57
250104-ba6h6avmhp 1004-01-2025 00:49
250104-a6k2navkhr 1004-01-2025 00:42
250104-a2lgmavjbp 1004-01-2025 00:36
250104-ax6a8s1rcz 1004-01-2025 00:31
250104-avh3xs1qa1 1004-01-2025 00:29
250104-asx43a1pdw 1004-01-2025 00:25
250104-aq52wstnbk 10Analysis
-
max time kernel
7s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 01:01
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10v2004-20241007-en
General
-
Target
Loader.exe
-
Size
381KB
-
MD5
e37c6fb17af3c80377cf78f861c0bd80
-
SHA1
9b7a465d5e118453b794e577d01d0865b54ee663
-
SHA256
9c4b510c6b65c6fa54a2308b743ecb89dcbd44e9d039c890dc32c75ccf1538e8
-
SHA512
623e51f357d4fc054421f817931914dba0cc5bb92ca771f00376c4824d5366972b76c2efce6cfd284331f05008813ebfb1d75e4ea72fd92eab4ae3df9714b88e
-
SSDEEP
6144:72pwktDrDuMtoAAAySseHfMM/rE3jaIgHT2nC0osguHJL4jG9vKNfuCIO4+hQ3PC:L4C/AFseHEj+IgHTTOg8LDyNijZkZETm
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3388 set thread context of 2536 3388 Loader.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3272 3388 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3388 wrote to memory of 2536 3388 Loader.exe 83 PID 3388 wrote to memory of 2536 3388 Loader.exe 83 PID 3388 wrote to memory of 2536 3388 Loader.exe 83 PID 3388 wrote to memory of 2536 3388 Loader.exe 83 PID 3388 wrote to memory of 2536 3388 Loader.exe 83 PID 3388 wrote to memory of 2536 3388 Loader.exe 83 PID 3388 wrote to memory of 2536 3388 Loader.exe 83 PID 3388 wrote to memory of 2536 3388 Loader.exe 83 PID 3388 wrote to memory of 2536 3388 Loader.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 7842⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3388 -ip 33881⤵PID:2212