Overview
overview
10Static
static
7Setup/Setup.exe
windows7-x64
10Setup/Setup.exe
windows10-2004-x64
10Setup/data/app.so
ubuntu-24.04-amd64
1Setup/desk...in.dll
windows7-x64
1Setup/desk...in.dll
windows10-2004-x64
1Setup/flut...ws.dll
windows7-x64
1Setup/flut...ws.dll
windows10-2004-x64
1Setup/url_...in.dll
windows7-x64
1Setup/url_...in.dll
windows10-2004-x64
1Setup/wind...in.dll
windows7-x64
1Setup/wind...in.dll
windows10-2004-x64
1Analysis
-
max time kernel
97s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 15:32
Static task
static1
Behavioral task
behavioral1
Sample
Setup/Setup.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Setup/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Setup/data/app.so
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral4
Sample
Setup/desktop_drop_plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
Setup/desktop_drop_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Setup/flutter_windows.dll
Resource
win7-20241023-en
Behavioral task
behavioral7
Sample
Setup/flutter_windows.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Setup/url_launcher_windows_plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Setup/url_launcher_windows_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Setup/window_size_plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
Setup/window_size_plugin.dll
Resource
win10v2004-20241007-en
General
-
Target
Setup/Setup.exe
-
Size
359KB
-
MD5
17d02595a638c89749b2d8708e5a4cbf
-
SHA1
fbd95dff2f70c9ce2d6a4f97e035caf3401359b5
-
SHA256
3bc2ca18afed111109f54238d9515005e8c7c96397f17fd4759bf75c9bbe9825
-
SHA512
5ba7e5f113da0c4220ff85769ace56a3d5b61d5fce8cf929b1003bbef9b107de184467d4c7042596c4ccbde8725d44240ba0083b929c78aecc954f07b5393e95
-
SSDEEP
6144:tx6TG9JJVqzWnnTld7hIt1XaX3+TJuJ8j/d+or3KYtS7OA+eXr+mqW+:tQT4bnTS3Xa+lqiFBXtSyA+e7wZ
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Signatures
-
Lumma family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/2628-1-0x00000000008C0000-0x0000000000922000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2628 set thread context of 1984 2628 Setup.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 4084 2628 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2628 wrote to memory of 5048 2628 Setup.exe 83 PID 2628 wrote to memory of 5048 2628 Setup.exe 83 PID 2628 wrote to memory of 5048 2628 Setup.exe 83 PID 2628 wrote to memory of 1984 2628 Setup.exe 84 PID 2628 wrote to memory of 1984 2628 Setup.exe 84 PID 2628 wrote to memory of 1984 2628 Setup.exe 84 PID 2628 wrote to memory of 1984 2628 Setup.exe 84 PID 2628 wrote to memory of 1984 2628 Setup.exe 84 PID 2628 wrote to memory of 1984 2628 Setup.exe 84 PID 2628 wrote to memory of 1984 2628 Setup.exe 84 PID 2628 wrote to memory of 1984 2628 Setup.exe 84 PID 2628 wrote to memory of 1984 2628 Setup.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"2⤵PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 9802⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2628 -ip 26281⤵PID:4640