Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 18:59
Static task
static1
Behavioral task
behavioral1
Sample
CrosshairX.exe
Resource
win7-20240903-en
General
-
Target
CrosshairX.exe
-
Size
361KB
-
MD5
69bd9be788d02879474d95c9a50beb16
-
SHA1
f29aeddeb31b109bdabb519c9dc8204ade7e2fb8
-
SHA256
5685c21f0fea45d3b474e4f33689a444e7961b3fb2fed82502518931e7239ccc
-
SHA512
30a9eab7fa7a93c61bd90caa9a173b9fe32e9d93c1d0c73845e1c180bfd348673f7070d5fc694d48f24c49f669c0b4b364f13962f778c9fbba84ba604ebfc4e6
-
SSDEEP
6144:pTPOsgo5qJgKjOfDDBrwHJAtlsGMpZh7exUG0Gv0JYlCaLkmJ3/n2b:pPOi8go6BrwSMpZg+GBv0JYlCahJ34
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2792 set thread context of 2060 2792 CrosshairX.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 1620 2792 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2060 2792 CrosshairX.exe 83 PID 2792 wrote to memory of 2060 2792 CrosshairX.exe 83 PID 2792 wrote to memory of 2060 2792 CrosshairX.exe 83 PID 2792 wrote to memory of 2060 2792 CrosshairX.exe 83 PID 2792 wrote to memory of 2060 2792 CrosshairX.exe 83 PID 2792 wrote to memory of 2060 2792 CrosshairX.exe 83 PID 2792 wrote to memory of 2060 2792 CrosshairX.exe 83 PID 2792 wrote to memory of 2060 2792 CrosshairX.exe 83 PID 2792 wrote to memory of 2060 2792 CrosshairX.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 8202⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2792 -ip 27921⤵PID:3932