Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 14:36
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20241023-en
General
-
Target
Installer.exe
-
Size
361KB
-
MD5
34a3481203725a7a71f3d1396f3af901
-
SHA1
f6227c6d79fe5f7ba3b6b978fd97e69fc34796f0
-
SHA256
312fad54a43a1288c4df1aac24ee0809f30b38a2d6b9837110d3343aa8f04cdd
-
SHA512
52458c8be4fb6c47c1899994b332fc3ec0a09705f477c0424b4850eeeacd7dccb4a869ec16b45a3bbb0f4c62947123400927bdc29e143988871d5c20354ea0af
-
SSDEEP
6144:6BNgBIBbkWunVDgLQzDN8xj+3/0j2qSL6qLsVCaXzOxNjIfuKuu5QkpnQ:9BsQW+VaQPN8xj+P0j2qPq4VCqz2dIfI
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2124-1-0x00000000009E0000-0x0000000000A42000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 1236 2124 Installer.exe 31 -
Program crash 2 IoCs
pid pid_target Process procid_target 2564 1236 WerFault.exe 31 2096 2124 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 1236 2124 Installer.exe 31 PID 2124 wrote to memory of 2096 2124 Installer.exe 32 PID 2124 wrote to memory of 2096 2124 Installer.exe 32 PID 2124 wrote to memory of 2096 2124 Installer.exe 32 PID 2124 wrote to memory of 2096 2124 Installer.exe 32 PID 1236 wrote to memory of 2564 1236 Installer.exe 33 PID 1236 wrote to memory of 2564 1236 Installer.exe 33 PID 1236 wrote to memory of 2564 1236 Installer.exe 33 PID 1236 wrote to memory of 2564 1236 Installer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 1483⤵
- Program crash
PID:2564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 682⤵
- Program crash
PID:2096
-