Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 14:56
Static task
static1
Behavioral task
behavioral1
Sample
PsfLauncher32.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PsfLauncher32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PsfRuntime32.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
PsfRuntime32.dll
Resource
win10v2004-20241007-en
General
-
Target
PsfLauncher32.exe
-
Size
409KB
-
MD5
bbfa1775487c17383c10899ab8f9de7b
-
SHA1
004724f3dde5ca8b5b51d2436b04898567d5dbcf
-
SHA256
49e941b4c194bb97db10466d29c7dfc4b557b70913b43acc21d2572a936970f4
-
SHA512
ab774c1c341350b54d3aefe9f0e2ed7048d714409c4e148eb26738a255fdaf0c402e07b17086b73bba724bd3916722cd93e730a0c878d511533289d78632200e
-
SSDEEP
12288:lFcYBTSR7FqCiiD/UIC7R8muz6gKSCxX4/m03PcdHSg:lK3dDMIW8CSCxIzPctSg
Malware Config
Extracted
lumma
https://latyoutw.cyou/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 1808 PsfLauncher32.exe -
Loads dropped DLL 1 IoCs
pid Process 1808 PsfLauncher32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1808 set thread context of 4504 1808 PsfLauncher32.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PsfLauncher32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PsfLauncher32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1692 PsfLauncher32.exe 1808 PsfLauncher32.exe 1808 PsfLauncher32.exe 4504 cmd.exe 4504 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1808 PsfLauncher32.exe 4504 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1808 1692 PsfLauncher32.exe 82 PID 1692 wrote to memory of 1808 1692 PsfLauncher32.exe 82 PID 1692 wrote to memory of 1808 1692 PsfLauncher32.exe 82 PID 1808 wrote to memory of 4504 1808 PsfLauncher32.exe 83 PID 1808 wrote to memory of 4504 1808 PsfLauncher32.exe 83 PID 1808 wrote to memory of 4504 1808 PsfLauncher32.exe 83 PID 1808 wrote to memory of 4504 1808 PsfLauncher32.exe 83 PID 4504 wrote to memory of 2044 4504 cmd.exe 92 PID 4504 wrote to memory of 2044 4504 cmd.exe 92 PID 4504 wrote to memory of 2044 4504 cmd.exe 92 PID 4504 wrote to memory of 2044 4504 cmd.exe 92 PID 4504 wrote to memory of 2044 4504 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\PsfLauncher32.exe"C:\Users\Admin\AppData\Local\Temp\PsfLauncher32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\OKNService\PsfLauncher32.exeC:\Users\Admin\AppData\Roaming\OKNService\PsfLauncher32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023KB
MD54ae932c17196940f5425785d258053d5
SHA1e54c54ee6c7eb5984f591cdaf1e7be9dc4e9b230
SHA2565d8b40b496a177e06de755aa0429d147fb2d344ce4baa61dd7c11e1398c3da46
SHA51259ed1dcfad74ba2daed324b2e8dfa56b3a1a7826017ee896bd9573120a417fc735153fee611b0a9d6d2e3226e1935eb8131d6d302f4f1a07b4be126f4bf0fd0a
-
Filesize
409KB
MD5bbfa1775487c17383c10899ab8f9de7b
SHA1004724f3dde5ca8b5b51d2436b04898567d5dbcf
SHA25649e941b4c194bb97db10466d29c7dfc4b557b70913b43acc21d2572a936970f4
SHA512ab774c1c341350b54d3aefe9f0e2ed7048d714409c4e148eb26738a255fdaf0c402e07b17086b73bba724bd3916722cd93e730a0c878d511533289d78632200e
-
Filesize
348KB
MD52f930c4a4290be73802a5d650d613203
SHA1fd98498a18edba028b4f590e7bd618ab7790391d
SHA256e4ed1603a409bbfe6b6cb2aed7bac31b4c2812011aed11622fe6a00128f8a3e7
SHA5125369b746856059da218e757bee86436c7c53828cccb7931245e8a96a6429eee6cc884103ee4b1ef678a595ff889933b22e938154b5a31e425340c7845a57b247
-
Filesize
783KB
MD5aae8d1be7e27e9e67d21182bb6187dec
SHA1e34c18c6a3f1b3501c4e986167a6cae819f7b69e
SHA256c30852584dc13abe0b412668fa539651a0bbd9f96eb4b1a262c5db2509452509
SHA512132429f04f07024f5e262abbd641676040db5149ee9bebca42dff0420807e0f0f56d51de034d77b554c90c6351b977f585de17d1db57540ebe5f499087a36dba
-
Filesize
41KB
MD5f5b53d748a52cb9e8ac03495d4ad4a65
SHA1f44d112bc5417f697057b03c307e9a4bf745d87e
SHA256543de0764080883065f0fef2e20835d89115f4caac7e9cc4c4a56f97fc24f28d
SHA512713ebfe302e76d38f24b7a07fe6f787c1b65bf5a3f615e87d36408464a9e40ca3f511405cea0e4674c0881a7c288232fd234bfaf1791475d21c98c54b177f8fe