Overview
overview
10Static
static
3Fluxion Launcher.rar
windows11-21h2-x64
10Fluxion La...tb.dll
windows11-21h2-x64
1Fluxion La...te.dll
windows11-21h2-x64
1Fluxion La...ig.cfg
windows11-21h2-x64
3Fluxion La...dv.dll
windows11-21h2-x64
1Fluxion La...n).txt
windows11-21h2-x64
3Fluxion La...eu.dll
windows11-21h2-x64
1Fluxion La...32.dll
windows11-21h2-x64
1Fluxion La...tb.dll
windows11-21h2-x64
1Fluxion La...or.dll
windows11-21h2-x64
1Fluxion La...32.dll
windows11-21h2-x64
1Fluxion La...er.exe
windows11-21h2-x64
10Fluxion La...ct.dll
windows11-21h2-x64
1Fluxion La...pt.dll
windows11-21h2-x64
1Fluxion La...on.dll
windows11-21h2-x64
1Fluxion La...te.dll
windows11-21h2-x64
1Fluxion La...32.dll
windows11-21h2-x64
1Fluxion La...ig.dll
windows11-21h2-x64
1Fluxion La...32.dll
windows11-21h2-x64
1Fluxion La...fg.dll
windows11-21h2-x64
1Fluxion La...d9.dll
windows11-21h2-x64
1Fluxion La...d3.dll
windows11-21h2-x64
1Analysis
-
max time kernel
231s -
max time network
234s -
platform
windows11-21h2_x64 -
resource
win11-20241007-de -
resource tags
arch:x64arch:x86image:win11-20241007-delocale:de-deos:windows11-21h2-x64systemwindows -
submitted
16-01-2025 20:08
Static task
static1
Behavioral task
behavioral1
Sample
Fluxion Launcher.rar
Resource
win11-20241007-de
Behavioral task
behavioral2
Sample
Fluxion Launcher/Aayhtb.dll
Resource
win11-20241007-de
Behavioral task
behavioral3
Sample
Fluxion Launcher/Autoupdate.dll
Resource
win11-20241007-de
Behavioral task
behavioral4
Sample
Fluxion Launcher/Config.cfg
Resource
win11-20241023-de
Behavioral task
behavioral5
Sample
Fluxion Launcher/Quadv.dll
Resource
win11-20241007-de
Behavioral task
behavioral6
Sample
Fluxion Launcher/READ ME (PASSWORD Fluxion).txt
Resource
win11-20241007-de
Behavioral task
behavioral7
Sample
Fluxion Launcher/Xheu.dll
Resource
win11-20241007-de
Behavioral task
behavioral8
Sample
Fluxion Launcher/aah32.dll
Resource
win11-20241007-de
Behavioral task
behavioral9
Sample
Fluxion Launcher/bin/Aayhtb.dll
Resource
win11-20241007-de
Behavioral task
behavioral10
Sample
Fluxion Launcher/bin/Autoupdatefor.dll
Resource
win11-20241023-de
Behavioral task
behavioral11
Sample
Fluxion Launcher/bin/aah32.dll
Resource
win11-20241007-de
Behavioral task
behavioral12
Sample
Fluxion Launcher/fluxionlauncher.exe
Resource
win11-20241007-de
Behavioral task
behavioral13
Sample
Fluxion Launcher/inject.dll
Resource
win11-20241007-de
Behavioral task
behavioral14
Sample
Fluxion Launcher/script.dll
Resource
win11-20241007-de
Behavioral task
behavioral15
Sample
Fluxion Launcher/version.dll
Resource
win11-20241007-de
Behavioral task
behavioral16
Sample
Fluxion Launcher/x32/autoupdate.dll
Resource
win11-20241007-de
Behavioral task
behavioral17
Sample
Fluxion Launcher/x32/x32.dll
Resource
win11-20241007-de
Behavioral task
behavioral18
Sample
Fluxion Launcher/x32/x64config.dll
Resource
win11-20241007-de
Behavioral task
behavioral19
Sample
Fluxion Launcher/x64/Vsg32.dll
Resource
win11-20241007-de
Behavioral task
behavioral20
Sample
Fluxion Launcher/x64/cfg.dll
Resource
win11-20241007-de
Behavioral task
behavioral21
Sample
Fluxion Launcher/x64/x32d9.dll
Resource
win11-20241007-de
Behavioral task
behavioral22
Sample
Fluxion Launcher/x64/x64d3.dll
Resource
win11-20241007-de
General
-
Target
Fluxion Launcher.rar
-
Size
3.3MB
-
MD5
eee78ef06b0bee50ebeb26dd87c810ce
-
SHA1
a098985153e9b9c68f42e891045845cbb4d3b915
-
SHA256
ac9881ba3da632e68be376d6ac307962bd9116fa2240a3eb53f564f8f8d2673e
-
SHA512
135c0c65cd9cfc4f146aba090899ebaffbdbc71816365a568473e8837e0b43e0cb9e031f78dfa4469334a519d09d516db5204a344bbeedc65cf2840d40a776f3
-
SSDEEP
98304:3sMGdImCv5E3aYmlKvA43Y0Ozi/uIArpyKg:395mqE37A6XNOu/uNrpyL
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
https://letterdrive.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 9 IoCs
pid Process 1948 fluxionlauncher.exe 3324 fluxionlauncher.exe 1356 fluxionlauncher.exe 4468 fluxionlauncher.exe 2964 fluxionlauncher.exe 2468 fluxionlauncher.exe 4176 fluxionlauncher.exe 3412 fluxionlauncher.exe 3524 fluxionlauncher.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1948 set thread context of 3324 1948 fluxionlauncher.exe 83 PID 1948 set thread context of 1356 1948 fluxionlauncher.exe 84 PID 4468 set thread context of 2964 4468 fluxionlauncher.exe 90 PID 4468 set thread context of 3524 4468 fluxionlauncher.exe 94 -
Program crash 2 IoCs
pid pid_target Process procid_target 1464 1948 WerFault.exe 79 3848 4468 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fluxionlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fluxionlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fluxionlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fluxionlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fluxionlauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fluxionlauncher.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2632 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2632 7zFM.exe Token: 35 2632 7zFM.exe Token: SeSecurityPrivilege 2632 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2632 7zFM.exe 2632 7zFM.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1948 wrote to memory of 3324 1948 fluxionlauncher.exe 83 PID 1948 wrote to memory of 3324 1948 fluxionlauncher.exe 83 PID 1948 wrote to memory of 3324 1948 fluxionlauncher.exe 83 PID 1948 wrote to memory of 3324 1948 fluxionlauncher.exe 83 PID 1948 wrote to memory of 3324 1948 fluxionlauncher.exe 83 PID 1948 wrote to memory of 3324 1948 fluxionlauncher.exe 83 PID 1948 wrote to memory of 3324 1948 fluxionlauncher.exe 83 PID 1948 wrote to memory of 3324 1948 fluxionlauncher.exe 83 PID 1948 wrote to memory of 3324 1948 fluxionlauncher.exe 83 PID 1948 wrote to memory of 1356 1948 fluxionlauncher.exe 84 PID 1948 wrote to memory of 1356 1948 fluxionlauncher.exe 84 PID 1948 wrote to memory of 1356 1948 fluxionlauncher.exe 84 PID 1948 wrote to memory of 1356 1948 fluxionlauncher.exe 84 PID 1948 wrote to memory of 1356 1948 fluxionlauncher.exe 84 PID 1948 wrote to memory of 1356 1948 fluxionlauncher.exe 84 PID 1948 wrote to memory of 1356 1948 fluxionlauncher.exe 84 PID 1948 wrote to memory of 1356 1948 fluxionlauncher.exe 84 PID 1948 wrote to memory of 1356 1948 fluxionlauncher.exe 84 PID 4468 wrote to memory of 2964 4468 fluxionlauncher.exe 90 PID 4468 wrote to memory of 2964 4468 fluxionlauncher.exe 90 PID 4468 wrote to memory of 2964 4468 fluxionlauncher.exe 90 PID 4468 wrote to memory of 2964 4468 fluxionlauncher.exe 90 PID 4468 wrote to memory of 2964 4468 fluxionlauncher.exe 90 PID 4468 wrote to memory of 2964 4468 fluxionlauncher.exe 90 PID 4468 wrote to memory of 2964 4468 fluxionlauncher.exe 90 PID 4468 wrote to memory of 2964 4468 fluxionlauncher.exe 90 PID 4468 wrote to memory of 2964 4468 fluxionlauncher.exe 90 PID 4468 wrote to memory of 2468 4468 fluxionlauncher.exe 91 PID 4468 wrote to memory of 2468 4468 fluxionlauncher.exe 91 PID 4468 wrote to memory of 2468 4468 fluxionlauncher.exe 91 PID 4468 wrote to memory of 4176 4468 fluxionlauncher.exe 92 PID 4468 wrote to memory of 4176 4468 fluxionlauncher.exe 92 PID 4468 wrote to memory of 4176 4468 fluxionlauncher.exe 92 PID 4468 wrote to memory of 3412 4468 fluxionlauncher.exe 93 PID 4468 wrote to memory of 3412 4468 fluxionlauncher.exe 93 PID 4468 wrote to memory of 3412 4468 fluxionlauncher.exe 93 PID 4468 wrote to memory of 3524 4468 fluxionlauncher.exe 94 PID 4468 wrote to memory of 3524 4468 fluxionlauncher.exe 94 PID 4468 wrote to memory of 3524 4468 fluxionlauncher.exe 94 PID 4468 wrote to memory of 3524 4468 fluxionlauncher.exe 94 PID 4468 wrote to memory of 3524 4468 fluxionlauncher.exe 94 PID 4468 wrote to memory of 3524 4468 fluxionlauncher.exe 94 PID 4468 wrote to memory of 3524 4468 fluxionlauncher.exe 94 PID 4468 wrote to memory of 3524 4468 fluxionlauncher.exe 94 PID 4468 wrote to memory of 3524 4468 fluxionlauncher.exe 94
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher.rar"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2632
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3652
-
C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3324
-
-
C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 8162⤵
- Program crash
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1948 -ip 19481⤵PID:1284
-
C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"2⤵
- Executes dropped EXE
PID:4176
-
-
C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"2⤵
- Executes dropped EXE
PID:3412
-
-
C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"C:\Users\Admin\Downloads\Fluxion Launcher\fluxionlauncher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 8322⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4468 -ip 44681⤵PID:244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD551397005ac7db572e3af109699f4ba73
SHA1c9bcb56dd1a4c4b687917aac34f703908a5d4bde
SHA25607bd44748b663d9efbf35cd962408b57ad72a7ce65bdc2722db284f343b2d891
SHA512512740d00adf5512cd8f6ca163a1c137a0e17091243d880271945b90306f7ddc6b47928b27985c5b60b4474e5be57273308babe50986fda638dc6b8ea2f0f2c8
-
Filesize
339KB
MD50faa74d371ad58d493b2df890c610774
SHA1c7a155aca4a20258fc1105b91d5d94205415546a
SHA2564d6330d6d983a30c5a0e469058075e96b6e8109daff1ac41a910aab2621f488d
SHA512fa603a7a93062d72ff33e3a0562357169148470ac0defef8145d629a5efa7e87f5481a82ee1a7c4e8bcb26e242f7fa4074076f2ca0a08fa0e0b158544f9da223
-
Filesize
5.0MB
MD57bfe885d87026d0d41dba5fb4173201c
SHA1027637e1c7fd24a7bbaba6b926cce67e47d8e7dc
SHA2562b529e8afa002053744bb4e2430513e7745f91b5052446ef2d0568e91d5b1280
SHA512d2ded5d1c216900e340425f652c585398f2662f3aefe552e80161af90d1656d2ed202366c2ac794564dbf6eca0c1d769f62fcb979a0d666ea06540e389a30951