Analysis
-
max time kernel
13s -
max time network
2s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-01-2025 17:20
General
-
Target
Loader.exe
-
Size
646KB
-
MD5
2ec18b257662dd107ae84263ecd2e5c1
-
SHA1
ce2efa8394c35b8da16428b10ece4a856c53dd1f
-
SHA256
539f0617a85a7a0773cf9e36d803c1a8ddf5c69dc003c80c1f3afac147b47554
-
SHA512
6cf6f83dbaca7f218f6add89de942bc6a8d83fef9ccbbb3f3ef3c03bba4233a25b18f1bc392da27b37b88bb649fecc7c05ed28a9dcf849de957103f03fa63342
-
SSDEEP
12288:xI6tpbrZqB16QBXv9trocVyiBFAMyhZVUEz4Pjt/ax7OA2:xIMH6JjocVy+yhZVUEz4PAx7O
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://ingreem-eilish.biz/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 4104 Loader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4104 set thread context of 1720 4104 Loader.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78 PID 4104 wrote to memory of 1720 4104 Loader.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD5037bf337c4de4bc965e3200beb1a5be8
SHA1317dc2ffca68cf71652cffe75d9d2a341a09cda8
SHA25629c961ee9f77637c881d9193c6499a84b1320372f3edc9b8337ab03fb8b8f589
SHA51210767a9b988843d5ed27c6509ce8801a2a604c5298cd602b4d26e1ab0957e837e1531f60dc37b3ec1de7ee0a1378e2250d3d737e58926f4d4b0e7cd1fb8275d9