Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 14:42
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20240903-en
General
-
Target
Installer.exe
-
Size
361KB
-
MD5
34a3481203725a7a71f3d1396f3af901
-
SHA1
f6227c6d79fe5f7ba3b6b978fd97e69fc34796f0
-
SHA256
312fad54a43a1288c4df1aac24ee0809f30b38a2d6b9837110d3343aa8f04cdd
-
SHA512
52458c8be4fb6c47c1899994b332fc3ec0a09705f477c0424b4850eeeacd7dccb4a869ec16b45a3bbb0f4c62947123400927bdc29e143988871d5c20354ea0af
-
SSDEEP
6144:6BNgBIBbkWunVDgLQzDN8xj+3/0j2qSL6qLsVCaXzOxNjIfuKuu5QkpnQ:9BsQW+VaQPN8xj+P0j2qPq4VCqz2dIfI
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/2968-1-0x0000000000CA0000-0x0000000000D02000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2968 set thread context of 1696 2968 Installer.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 1068 2968 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1696 2968 Installer.exe 83 PID 2968 wrote to memory of 1696 2968 Installer.exe 83 PID 2968 wrote to memory of 1696 2968 Installer.exe 83 PID 2968 wrote to memory of 1696 2968 Installer.exe 83 PID 2968 wrote to memory of 1696 2968 Installer.exe 83 PID 2968 wrote to memory of 1696 2968 Installer.exe 83 PID 2968 wrote to memory of 1696 2968 Installer.exe 83 PID 2968 wrote to memory of 1696 2968 Installer.exe 83 PID 2968 wrote to memory of 1696 2968 Installer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 8322⤵
- Program crash
PID:1068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2968 -ip 29681⤵PID:2892