Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 19:33
Behavioral task
behavioral1
Sample
LoaderX.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LoaderX.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Loader.exe
Resource
win7-20241010-en
General
-
Target
Loader.exe
-
Size
351KB
-
MD5
563632d46f70efd015e04c5afc0bd791
-
SHA1
5bed140c2ad36d47d24c3ecfa611831b73baf7e5
-
SHA256
b474a71a09547dc6a5528bbea6e1ccad5485b589877ee276f038e9e7f3c8e417
-
SHA512
9e031aabf8e4e9bdab8d7b4a236a04aa6df0f5cd40fd869134bb13e4bdd8a422eeae763a8b3cf63177d748d3e76eb3cc989dbada4bba93701ec30ccf732bb703
-
SSDEEP
6144:790pJN5m3D3RzbyZXflCTnC1aNfPKSSx1L0uSnuw4qC5Hes:xc+DtbItUTSSyguwXW
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4632 set thread context of 3592 4632 Loader.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 1996 4632 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4632 wrote to memory of 4876 4632 Loader.exe 82 PID 4632 wrote to memory of 4876 4632 Loader.exe 82 PID 4632 wrote to memory of 4876 4632 Loader.exe 82 PID 4632 wrote to memory of 3592 4632 Loader.exe 83 PID 4632 wrote to memory of 3592 4632 Loader.exe 83 PID 4632 wrote to memory of 3592 4632 Loader.exe 83 PID 4632 wrote to memory of 3592 4632 Loader.exe 83 PID 4632 wrote to memory of 3592 4632 Loader.exe 83 PID 4632 wrote to memory of 3592 4632 Loader.exe 83 PID 4632 wrote to memory of 3592 4632 Loader.exe 83 PID 4632 wrote to memory of 3592 4632 Loader.exe 83 PID 4632 wrote to memory of 3592 4632 Loader.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 2602⤵
- Program crash
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4632 -ip 46321⤵PID:60