Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 23:16
Static task
static1
Behavioral task
behavioral1
Sample
MultiHack v1.8/Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MultiHack v1.8/Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
MultiHack v1.8/val.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
MultiHack v1.8/val.dll
Resource
win10v2004-20241007-en
General
-
Target
MultiHack v1.8/Loader.exe
-
Size
345KB
-
MD5
af8c79e72618067111d02f743943d915
-
SHA1
1a570b532bd5ddef3a4ee9c6266dcaee59cfe3aa
-
SHA256
e36248278653c3a331c82d8bbf0faf9c96a07ed2f1ae694e239a6060c712a665
-
SHA512
bd2ac826f4fe7b4c25c7a136bf5c1ef031ea764e0a6e0ce337a605679207450a2d801478faa83500acc32f28236aa4651c80f841f2de8e1af181b2979595a2b3
-
SSDEEP
6144:dVQyGO2hf4TnxD6RZdxFaaa4H2vXvFNDxwY3El8o/WMcZIjKH2LlgH1rzArF:XQJhhf4Lodx0aai2PNNa4ElPwi+of
Malware Config
Extracted
lumma
https://truculengisau.biz/api
https://spookycappy.biz/api
https://punishzement.biz/api
https://nuttyshop/api
https://nuttyshopr.biz/api
https://marketlumpe.biz/api
https://littlenotii.biz/api
https://grandiouseziu.biz/api
https://fraggielek.biz/api
Extracted
lumma
https://fraggielek.biz/api
https://grandiouseziu.biz/api
https://littlenotii.biz/api
https://marketlumpe.biz/api
https://nuttyshopr.biz/api
https://punishzement.biz/api
https://spookycappy.biz/api
https://truculengisau.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3840 set thread context of 3460 3840 Loader.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 3820 3840 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3460 3840 Loader.exe 84 PID 3840 wrote to memory of 3460 3840 Loader.exe 84 PID 3840 wrote to memory of 3460 3840 Loader.exe 84 PID 3840 wrote to memory of 3460 3840 Loader.exe 84 PID 3840 wrote to memory of 3460 3840 Loader.exe 84 PID 3840 wrote to memory of 3460 3840 Loader.exe 84 PID 3840 wrote to memory of 3460 3840 Loader.exe 84 PID 3840 wrote to memory of 3460 3840 Loader.exe 84 PID 3840 wrote to memory of 3460 3840 Loader.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\MultiHack v1.8\Loader.exe"C:\Users\Admin\AppData\Local\Temp\MultiHack v1.8\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\MultiHack v1.8\Loader.exe"C:\Users\Admin\AppData\Local\Temp\MultiHack v1.8\Loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 8082⤵
- Program crash
PID:3820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3840 -ip 38401⤵PID:4564