Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 17:58
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240903-en
General
-
Target
Loader.exe
-
Size
646KB
-
MD5
2ec18b257662dd107ae84263ecd2e5c1
-
SHA1
ce2efa8394c35b8da16428b10ece4a856c53dd1f
-
SHA256
539f0617a85a7a0773cf9e36d803c1a8ddf5c69dc003c80c1f3afac147b47554
-
SHA512
6cf6f83dbaca7f218f6add89de942bc6a8d83fef9ccbbb3f3ef3c03bba4233a25b18f1bc392da27b37b88bb649fecc7c05ed28a9dcf849de957103f03fa63342
-
SSDEEP
12288:xI6tpbrZqB16QBXv9trocVyiBFAMyhZVUEz4Pjt/ax7OA2:xIMH6JjocVy+yhZVUEz4PAx7O
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://ingreem-eilish.biz/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 3552 Loader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3552 set thread context of 1140 3552 Loader.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84 PID 3552 wrote to memory of 1140 3552 Loader.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD5037bf337c4de4bc965e3200beb1a5be8
SHA1317dc2ffca68cf71652cffe75d9d2a341a09cda8
SHA25629c961ee9f77637c881d9193c6499a84b1320372f3edc9b8337ab03fb8b8f589
SHA51210767a9b988843d5ed27c6509ce8801a2a604c5298cd602b4d26e1ab0957e837e1531f60dc37b3ec1de7ee0a1378e2250d3d737e58926f4d4b0e7cd1fb8275d9