Overview
overview
10Static
static
10Loader/Loader.exe
windows7-x64
10Loader/Loader.exe
windows10-2004-x64
10Loader/dmx...ls.dll
windows7-x64
1Loader/dmx...ls.dll
windows10-2004-x64
1Loader/lik...er.dll
windows10-2004-x64
1Loader/samlib.dll
windows7-x64
1Loader/samlib.dll
windows10-2004-x64
1Loader/wdi.dll
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 17:57
Behavioral task
behavioral1
Sample
Loader/Loader.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Loader/Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Loader/dmxmlhelputils.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Loader/dmxmlhelputils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Loader/likodi/NotificationController.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Loader/samlib.dll
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
Loader/samlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Loader/wdi.dll
Resource
win10v2004-20241007-en
General
-
Target
Loader/Loader.exe
-
Size
646KB
-
MD5
2ec18b257662dd107ae84263ecd2e5c1
-
SHA1
ce2efa8394c35b8da16428b10ece4a856c53dd1f
-
SHA256
539f0617a85a7a0773cf9e36d803c1a8ddf5c69dc003c80c1f3afac147b47554
-
SHA512
6cf6f83dbaca7f218f6add89de942bc6a8d83fef9ccbbb3f3ef3c03bba4233a25b18f1bc392da27b37b88bb649fecc7c05ed28a9dcf849de957103f03fa63342
-
SSDEEP
12288:xI6tpbrZqB16QBXv9trocVyiBFAMyhZVUEz4Pjt/ax7OA2:xIMH6JjocVy+yhZVUEz4PAx7O
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://ingreem-eilish.biz/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 3556 Loader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3556 set thread context of 2356 3556 Loader.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83 PID 3556 wrote to memory of 2356 3556 Loader.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD5037bf337c4de4bc965e3200beb1a5be8
SHA1317dc2ffca68cf71652cffe75d9d2a341a09cda8
SHA25629c961ee9f77637c881d9193c6499a84b1320372f3edc9b8337ab03fb8b8f589
SHA51210767a9b988843d5ed27c6509ce8801a2a604c5298cd602b4d26e1ab0957e837e1531f60dc37b3ec1de7ee0a1378e2250d3d737e58926f4d4b0e7cd1fb8275d9