Analysis
-
max time kernel
63s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 19:33
Behavioral task
behavioral1
Sample
LoaderX.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LoaderX.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Loader.exe
Resource
win7-20241010-en
General
-
Target
LoaderX.zip
-
Size
17.0MB
-
MD5
e6a995c34bf16ab93c3cabff19166c8b
-
SHA1
b83b6ec7847e13031ff9f758b1b6339d3fcd77b2
-
SHA256
b49b89328099bc486bc076e131bd380524bf7efd365629d975a727334fe586e1
-
SHA512
3abe34df98ad38ed5ba127ae537e31148a85219d4e1ec085b28012af95005ef99d7be45c5ad071714b192ebf1aaee2df144cdcbfb8db05ca9587f134b90087c3
-
SSDEEP
393216:JMmZnjuJA8Cg4pBeetbsVDoCeSf0sUxlUb4/pKFtz4PquA:aqUA8z4paDleSwdxKDzHuA
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 13 IoCs
pid Process 4380 Loader.exe 5080 Loader.exe 1736 Loader.exe 4260 Loader.exe 3472 Loader.exe 3864 Loader.exe 1700 Loader.exe 4816 Loader.exe 2412 Loader.exe 3672 Loader.exe 4856 Loader.exe 2168 Loader.exe 2332 Loader.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4380 set thread context of 4260 4380 Loader.exe 107 PID 3472 set thread context of 3864 3472 Loader.exe 116 PID 1700 set thread context of 2412 1700 Loader.exe 123 PID 3672 set thread context of 2332 3672 Loader.exe 131 -
Program crash 7 IoCs
pid pid_target Process procid_target 4636 4380 WerFault.exe 101 2376 3472 WerFault.exe 114 4796 1700 WerFault.exe 120 3988 3672 WerFault.exe 127 2100 3864 WerFault.exe 116 2096 3864 WerFault.exe 116 1328 3864 WerFault.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3652 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3652 7zFM.exe Token: 35 3652 7zFM.exe Token: SeSecurityPrivilege 3652 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3652 7zFM.exe 3652 7zFM.exe 3652 7zFM.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 4380 wrote to memory of 5080 4380 Loader.exe 105 PID 4380 wrote to memory of 5080 4380 Loader.exe 105 PID 4380 wrote to memory of 5080 4380 Loader.exe 105 PID 4380 wrote to memory of 1736 4380 Loader.exe 106 PID 4380 wrote to memory of 1736 4380 Loader.exe 106 PID 4380 wrote to memory of 1736 4380 Loader.exe 106 PID 4380 wrote to memory of 4260 4380 Loader.exe 107 PID 4380 wrote to memory of 4260 4380 Loader.exe 107 PID 4380 wrote to memory of 4260 4380 Loader.exe 107 PID 4380 wrote to memory of 4260 4380 Loader.exe 107 PID 4380 wrote to memory of 4260 4380 Loader.exe 107 PID 4380 wrote to memory of 4260 4380 Loader.exe 107 PID 4380 wrote to memory of 4260 4380 Loader.exe 107 PID 4380 wrote to memory of 4260 4380 Loader.exe 107 PID 4380 wrote to memory of 4260 4380 Loader.exe 107 PID 3472 wrote to memory of 3864 3472 Loader.exe 116 PID 3472 wrote to memory of 3864 3472 Loader.exe 116 PID 3472 wrote to memory of 3864 3472 Loader.exe 116 PID 3472 wrote to memory of 3864 3472 Loader.exe 116 PID 3472 wrote to memory of 3864 3472 Loader.exe 116 PID 3472 wrote to memory of 3864 3472 Loader.exe 116 PID 3472 wrote to memory of 3864 3472 Loader.exe 116 PID 3472 wrote to memory of 3864 3472 Loader.exe 116 PID 3472 wrote to memory of 3864 3472 Loader.exe 116 PID 1700 wrote to memory of 4816 1700 Loader.exe 122 PID 1700 wrote to memory of 4816 1700 Loader.exe 122 PID 1700 wrote to memory of 4816 1700 Loader.exe 122 PID 1700 wrote to memory of 2412 1700 Loader.exe 123 PID 1700 wrote to memory of 2412 1700 Loader.exe 123 PID 1700 wrote to memory of 2412 1700 Loader.exe 123 PID 1700 wrote to memory of 2412 1700 Loader.exe 123 PID 1700 wrote to memory of 2412 1700 Loader.exe 123 PID 1700 wrote to memory of 2412 1700 Loader.exe 123 PID 1700 wrote to memory of 2412 1700 Loader.exe 123 PID 1700 wrote to memory of 2412 1700 Loader.exe 123 PID 1700 wrote to memory of 2412 1700 Loader.exe 123 PID 3672 wrote to memory of 4856 3672 Loader.exe 129 PID 3672 wrote to memory of 4856 3672 Loader.exe 129 PID 3672 wrote to memory of 4856 3672 Loader.exe 129 PID 3672 wrote to memory of 2168 3672 Loader.exe 130 PID 3672 wrote to memory of 2168 3672 Loader.exe 130 PID 3672 wrote to memory of 2168 3672 Loader.exe 130 PID 3672 wrote to memory of 2332 3672 Loader.exe 131 PID 3672 wrote to memory of 2332 3672 Loader.exe 131 PID 3672 wrote to memory of 2332 3672 Loader.exe 131 PID 3672 wrote to memory of 2332 3672 Loader.exe 131 PID 3672 wrote to memory of 2332 3672 Loader.exe 131 PID 3672 wrote to memory of 2332 3672 Loader.exe 131 PID 3672 wrote to memory of 2332 3672 Loader.exe 131 PID 3672 wrote to memory of 2332 3672 Loader.exe 131 PID 3672 wrote to memory of 2332 3672 Loader.exe 131
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\LoaderX.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3652
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2916
-
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"2⤵
- Executes dropped EXE
PID:5080
-
-
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"2⤵
- Executes dropped EXE
PID:1736
-
-
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 1642⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4380 -ip 43801⤵PID:3240
-
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 12803⤵
- Program crash
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 12043⤵
- Program crash
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 13283⤵
- Program crash
PID:1328
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 2242⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3472 -ip 34721⤵PID:512
-
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"2⤵
- Executes dropped EXE
PID:4816
-
-
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 7642⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1700 -ip 17001⤵PID:4288
-
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"2⤵
- Executes dropped EXE
PID:4856
-
-
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"2⤵
- Executes dropped EXE
PID:2168
-
-
C:\Users\Admin\Downloads\New folder\Loader.exe"C:\Users\Admin\Downloads\New folder\Loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1362⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3672 -ip 36721⤵PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3864 -ip 38641⤵PID:3772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3864 -ip 38641⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3864 -ip 38641⤵PID:3500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD5563632d46f70efd015e04c5afc0bd791
SHA15bed140c2ad36d47d24c3ecfa611831b73baf7e5
SHA256b474a71a09547dc6a5528bbea6e1ccad5485b589877ee276f038e9e7f3c8e417
SHA5129e031aabf8e4e9bdab8d7b4a236a04aa6df0f5cd40fd869134bb13e4bdd8a422eeae763a8b3cf63177d748d3e76eb3cc989dbada4bba93701ec30ccf732bb703