Analysis
-
max time kernel
95s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 03:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
Bootstrapper.exe
-
Size
395KB
-
MD5
a9370df5fb60672577fd727e3e798e75
-
SHA1
a5b4a8c7caf397a3629e0156da2594de1b657776
-
SHA256
481a9e582ab314faa2ab950fc99ab39fc35c071bfaf45871089892129be66d55
-
SHA512
f72305b18065adf66f886f5e7a7b2c4a1196c2f2c881a5d7afa7dfb88aad069c0ad2ad47c814e9c193ea1b43b488c2784b1ea135ff0a012857ea28164dd5e94c
-
SSDEEP
6144:ux09BNmcrazYrGakdpRylUl1ScNezRTz8WAwPyZtdDy2bkd:uy9PhazGGpcUTSc4xYWAFdDyGk
Malware Config
Extracted
Family
lumma
C2
https://jubbenjusk.biz/api
Signatures
-
Lumma family
-
Program crash 1 IoCs
pid pid_target Process procid_target 4692 3300 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 13442⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3300 -ip 33001⤵PID:2768