Resubmissions
07-01-2025 05:09
250107-fs7ldsvrg1 10Analysis
-
max time kernel
35s -
max time network
36s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07-01-2025 05:09
Static task
static1
General
-
Target
Bootstrapper.exe
-
Size
6.6MB
-
MD5
29ca15934b67b18a91254ce253a588ca
-
SHA1
05dfc5bb1df62ca212e1c8adf5af4542f7ad8b78
-
SHA256
49615905016fb4de6a3b50d12979b1076eca6bc539d9bcbf2ed338b6b2299cc7
-
SHA512
f9d961bb6a1dcfb371fd50aa94d8aac60b0de3cef813ec8bb9003ca202b3d6c3611a526ed890583ce0c401ca79ea8088189ba0fd7e3ce3d47a9e159164e9571e
-
SSDEEP
196608:W2J2evtYNFkAvMzhj2F019IxNGqXzIYK:PztYNFkAvMzhj2F019IxNGqXi
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4880 set thread context of 3052 4880 Bootstrapper.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4880 wrote to memory of 3052 4880 Bootstrapper.exe 90 PID 4880 wrote to memory of 3052 4880 Bootstrapper.exe 90 PID 4880 wrote to memory of 3052 4880 Bootstrapper.exe 90 PID 4880 wrote to memory of 3052 4880 Bootstrapper.exe 90 PID 4880 wrote to memory of 3052 4880 Bootstrapper.exe 90 PID 4880 wrote to memory of 3052 4880 Bootstrapper.exe 90 PID 4880 wrote to memory of 3052 4880 Bootstrapper.exe 90 PID 4880 wrote to memory of 3052 4880 Bootstrapper.exe 90 PID 4880 wrote to memory of 3052 4880 Bootstrapper.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3052
-