Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 13:39
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20241023-en
General
-
Target
Loader.exe
-
Size
489KB
-
MD5
d685ae29670dbc00b6665b5511bda6cb
-
SHA1
2f49b83a6d7a5f9e5151c6f7f1b3fa9e6f4b25a9
-
SHA256
0518c095cc948ab003cd4d12a1f95f0579c52c17f9102976b5799cd0bd85e6a2
-
SHA512
d7705fcd8751a49cc17962ac9b6e228f55ef74aab066cabdd5de74518686feaea951487a042683ea3e055ce04e0b971b528572aac920f325fcf64d34167450de
-
SSDEEP
12288:uiNSSLq47oIkbTUINbTDw7j/puQ/FU5A8e2CI582g/c10/nGZj:uicGq47oDwgbTDGjxJ/2i8MI
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 4504 Loader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4504 set thread context of 1356 4504 Loader.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84 PID 4504 wrote to memory of 1356 4504 Loader.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD536c0b5018242a87d99e2b5000dfc29ad
SHA1d46f1ba661e3d18c8b1e7895920368e9bddbc7ae
SHA25694cc3d303105493943c6cce20473c82eff3942515bfd73df976e802d97be78b4
SHA5128f10af3f519e2c52539fb79ec16cd82470f25c0863b622030ed4bd59f437c9109caf46d151c18889c4939a44672339d75029c8f757cf7118e759b90355317f0a