Analysis
-
max time kernel
90s -
max time network
92s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-01-2025 00:22
Static task
static1
Behavioral task
behavioral1
Sample
mmpack.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
mmpack.exe
-
Size
348KB
-
MD5
b0699f53dfb455dc80011d9c6d34bcc1
-
SHA1
4f3a909416a81c95a5253c4df2a275a953313bcf
-
SHA256
5131d285914de648121ba99b3ec9e99c170c14cb0c64192addcc343554869286
-
SHA512
7f47784ad9153b64844d2fcdd2aadccee698922f626639dc223d17398b4b388cceb89638ce001fa9d4a4672117088c425e500601d9e69d436014b6cfb5942fb1
-
SSDEEP
6144:JVQLpl89uI8tc6zNARfjccLQIzIxnCwpN+TeI9qhQlOT4YikJOBDe77ibuLWi:7QOuI8t7zORfdLNPL84Y25E7ibu3
Malware Config
Extracted
lumma
https://truculengisau.biz/api
https://spookycappy.biz/api
https://punishzement.biz/api
https://nuttyshop/api
https://nuttyshopr.biz/api
https://marketlumpe.biz/api
https://littlenotii.biz/api
https://grandiouseziu.biz/api
https://fraggielek.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4172 set thread context of 2660 4172 mmpack.exe 79 PID 4172 set thread context of 3392 4172 mmpack.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 3348 4172 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmpack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmpack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmpack.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4172 wrote to memory of 2660 4172 mmpack.exe 79 PID 4172 wrote to memory of 2660 4172 mmpack.exe 79 PID 4172 wrote to memory of 2660 4172 mmpack.exe 79 PID 4172 wrote to memory of 2660 4172 mmpack.exe 79 PID 4172 wrote to memory of 2660 4172 mmpack.exe 79 PID 4172 wrote to memory of 2660 4172 mmpack.exe 79 PID 4172 wrote to memory of 2660 4172 mmpack.exe 79 PID 4172 wrote to memory of 2660 4172 mmpack.exe 79 PID 4172 wrote to memory of 2660 4172 mmpack.exe 79 PID 4172 wrote to memory of 4088 4172 mmpack.exe 80 PID 4172 wrote to memory of 4088 4172 mmpack.exe 80 PID 4172 wrote to memory of 4088 4172 mmpack.exe 80 PID 4172 wrote to memory of 3392 4172 mmpack.exe 81 PID 4172 wrote to memory of 3392 4172 mmpack.exe 81 PID 4172 wrote to memory of 3392 4172 mmpack.exe 81 PID 4172 wrote to memory of 3392 4172 mmpack.exe 81 PID 4172 wrote to memory of 3392 4172 mmpack.exe 81 PID 4172 wrote to memory of 3392 4172 mmpack.exe 81 PID 4172 wrote to memory of 3392 4172 mmpack.exe 81 PID 4172 wrote to memory of 3392 4172 mmpack.exe 81 PID 4172 wrote to memory of 3392 4172 mmpack.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\mmpack.exe"C:\Users\Admin\AppData\Local\Temp\mmpack.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\mmpack.exe"C:\Users\Admin\AppData\Local\Temp\mmpack.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\mmpack.exe"C:\Users\Admin\AppData\Local\Temp\mmpack.exe"2⤵PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\mmpack.exe"C:\Users\Admin\AppData\Local\Temp\mmpack.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 8282⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4172 -ip 41721⤵PID:732