Overview
overview
10Static
static
10Loader.zip
windows11-21h2-x64
1Loader/Loader.exe
windows11-21h2-x64
10Loader/dmx...ls.dll
windows11-21h2-x64
1Loader/lik...er.dll
windows11-21h2-x64
1Loader/lik...ll.mui
windows11-21h2-x64
3Loader/lik...ll.mui
windows11-21h2-x64
3Loader/lik...ll.mui
windows11-21h2-x64
3Loader/mqutil.dll.mui
windows11-21h2-x64
3Loader/samlib.dll
windows11-21h2-x64
1Loader/wdi.dll
windows11-21h2-x64
3Analysis
-
max time kernel
131s -
max time network
136s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-01-2025 01:31
Behavioral task
behavioral1
Sample
Loader.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Loader/Loader.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Loader/dmxmlhelputils.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Loader/likodi/NotificationController.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Loader/likodi/SmiEngine.dll.mui
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Loader/likodi/netid.dll.mui
Resource
win11-20241023-en
Behavioral task
behavioral7
Sample
Loader/likodi/wfascim.dll.mui
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Loader/mqutil.dll.mui
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Loader/samlib.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Loader/wdi.dll
Resource
win11-20241007-en
General
-
Target
Loader/Loader.exe
-
Size
646KB
-
MD5
2ec18b257662dd107ae84263ecd2e5c1
-
SHA1
ce2efa8394c35b8da16428b10ece4a856c53dd1f
-
SHA256
539f0617a85a7a0773cf9e36d803c1a8ddf5c69dc003c80c1f3afac147b47554
-
SHA512
6cf6f83dbaca7f218f6add89de942bc6a8d83fef9ccbbb3f3ef3c03bba4233a25b18f1bc392da27b37b88bb649fecc7c05ed28a9dcf849de957103f03fa63342
-
SSDEEP
12288:xI6tpbrZqB16QBXv9trocVyiBFAMyhZVUEz4Pjt/ax7OA2:xIMH6JjocVy+yhZVUEz4PAx7O
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://ingreem-eilish.biz/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 396 Loader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 396 set thread context of 2300 396 Loader.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78 PID 396 wrote to memory of 2300 396 Loader.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4712
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\fd63f2cf-5c3f-435f-ac6f-ae3cc4cd9063.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
635KB
MD5037bf337c4de4bc965e3200beb1a5be8
SHA1317dc2ffca68cf71652cffe75d9d2a341a09cda8
SHA25629c961ee9f77637c881d9193c6499a84b1320372f3edc9b8337ab03fb8b8f589
SHA51210767a9b988843d5ed27c6509ce8801a2a604c5298cd602b4d26e1ab0957e837e1531f60dc37b3ec1de7ee0a1378e2250d3d737e58926f4d4b0e7cd1fb8275d9