Analysis
-
max time kernel
52s -
max time network
43s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-01-2025 20:24
Static task
static1
General
-
Target
setup.exe
-
Size
71.1MB
-
MD5
cba1d2bf7aadf6edad9b1074f1d52bc0
-
SHA1
a90cc53c1ee1299cb5c574bc3fc05198e3b23946
-
SHA256
d95f10c803cc592a57604241152555f90f4699e8e34cdc3b2189b2a752724024
-
SHA512
57e20798450eeb1ebbf19b776ff3a2d7dc4d199f64fdc5e80184333afdccc41729cd24cccd8854c443d1bdd153f0875fbfe435446c9a29d1086fa57b8035c78b
-
SSDEEP
24576:L+QSkqgJVQNDa5lZe9fvyErqPW+UHx+/szlzBF6TmJaxEX:L7Xqei9f7qw3BzB8Tk
Malware Config
Extracted
lumma
https://relatiounces.cyou/api
https://fraggielek.biz/api
https://grandiouseziu.biz/api
https://littlenotii.biz/api
https://marketlumpe.biz/api
https://nuttyshopr.biz/api
https://punishzement.biz/api
https://spookycappy.biz/api
https://truculengisau.biz/api
Signatures
-
Lumma family
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3060 3884 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3352 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3108 setup.exe 3108 setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3352 vlc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3884 wmplayer.exe Token: SeCreatePagefilePrivilege 3884 wmplayer.exe Token: SeShutdownPrivilege 2200 unregmp2.exe Token: SeCreatePagefilePrivilege 2200 unregmp2.exe Token: SeTcbPrivilege 1460 svchost.exe Token: SeRestorePrivilege 1460 svchost.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 3884 wmplayer.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe 3352 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3352 vlc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3884 wrote to memory of 984 3884 wmplayer.exe 92 PID 3884 wrote to memory of 984 3884 wmplayer.exe 92 PID 3884 wrote to memory of 984 3884 wmplayer.exe 92 PID 984 wrote to memory of 2200 984 unregmp2.exe 93 PID 984 wrote to memory of 2200 984 unregmp2.exe 93 PID 1460 wrote to memory of 2224 1460 svchost.exe 98 PID 1460 wrote to memory of 2224 1460 svchost.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 31122⤵
- Program crash
PID:3060
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\dashost.exedashost.exe {03413c31-3983-46d2-9f52f1751d9c28cd}2⤵PID:2224
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SendEdit.mpe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3884 -ip 38841⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD5813d469474f4ef922e610a48e5a450d6
SHA1510cfad40377b067db055ba96ac3b8cbaf553844
SHA25658e8758f003b4c4ce8457b16921549355a62aaab27b8526bbfe6b3cbb6c0d99a
SHA5126b4553fc76ae6becdd095dcfa3a9487c4e18503da160f09d9affaad4e935345aaffb7aa38c16140bc05597c3623006e4938df856bd52e15d4967767867e3d40c
-
Filesize
68KB
MD5146d61ae38dd1f4d11c988642eb0b784
SHA1c135e2f99ec95da4081b0cd4b8e1083bc692d575
SHA256a4d5c760b3fcde931f52b967f08aeefe6c057bd9fb04bb959b477e8f6f5d41e2
SHA5123815ead842ca6e3c187439de60ff7a0649d9a56af2faca6a159d5d1dc3cddd856f2cafef9105948977a95b48a5290846878a15281299875e3dd407a857171bd6
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD573ee53e527d846ab687ca80c1f0c4c6b
SHA1edae173495d9eb5ece5f95b1459694948f052332
SHA2560d12d4e6caa966cc1b746e51dcb7f73b7ebdc487c2c7da9744bd35510749c417
SHA512255dee542be11d4113da796667b3adf782b4d075744a7562eb90414396078215d667f257e8ce3a56e0dbb229f70ae1046818b176f7439c6a6208468fa790e6a3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD52efe0ac15189261479679bb6bedea4ac
SHA1f0092d2d10e2aea34b363c34d29a07ccff43ff1c
SHA256a08fbd877277f15108219d43e8a33eea90751c4465abb11a35c8593137da8fff
SHA512914d8b5065069066aaf006bca06513938e11ad44a07df9f98999f8a8288da1e9e61d8b2d257d544951ca02a2b5afb992cbf803deb3bbe4fbe6318f2cad59f7ce
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD535bcdeb82a3f12a0dd1f4f90039402ec
SHA118133f2456c3969ecb7db30b62de6c8341d5825a
SHA2560d6717c94ddbe4ba22e3311d8019f2ffbbde784d64b906cd7fa3aa052441ae5f
SHA5126d39c8fa9e50cd751f2173cc1654cecd8eae73628d868f30ad64b9f3fe2c4719e451851f00fa04529af6ca2dcd69ffe15973737f4df3d7ea518004ec1119a1c5