Analysis
-
max time kernel
93s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 23:26
Static task
static1
Behavioral task
behavioral1
Sample
Set-up-edit.exe
Resource
win7-20240708-en
General
-
Target
Set-up-edit.exe
-
Size
2.9MB
-
MD5
811ccb4cedcdab35c288bec22e32798c
-
SHA1
4790da91cd98b653f5f7a63d6210941721b1018f
-
SHA256
ae0db4dee13f262b02514a5e72923c896023417e4d7a61accf102b3b2cec98ea
-
SHA512
3ff65251a3f6ac1e0f244c65e75605f8f1972f7e331d13e52ad30df6bc3a369f1f638bdeb2ca31f52021eff1271cf868c44472ba7dbb481033438b2b4fcc6dc4
-
SSDEEP
49152:Ugb/hT+/+pb1kgY3kWxWtWkbHVRv08IV38/3KseT2RNeWOuRQ3Dz7ikNl9Gvi:VDo/4pW3kOWVb1Rv08IVkKvkeIQHmk/1
Malware Config
Extracted
lumma
https://joinresperct.shop/api
Signatures
-
Lumma family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Set-up-edit.tmp Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Set-up-edit.tmp -
Executes dropped EXE 3 IoCs
pid Process 2408 Set-up-edit.tmp 4856 Set-up-edit.tmp 2156 VideoSnapsh.exe -
Loads dropped DLL 4 IoCs
pid Process 2408 Set-up-edit.tmp 2408 Set-up-edit.tmp 4856 Set-up-edit.tmp 4856 Set-up-edit.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up-edit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up-edit.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up-edit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up-edit.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VideoSnapsh.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4856 Set-up-edit.tmp 4856 Set-up-edit.tmp 2156 VideoSnapsh.exe 2156 VideoSnapsh.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4856 Set-up-edit.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4768 wrote to memory of 2408 4768 Set-up-edit.exe 83 PID 4768 wrote to memory of 2408 4768 Set-up-edit.exe 83 PID 4768 wrote to memory of 2408 4768 Set-up-edit.exe 83 PID 2408 wrote to memory of 3892 2408 Set-up-edit.tmp 84 PID 2408 wrote to memory of 3892 2408 Set-up-edit.tmp 84 PID 2408 wrote to memory of 3892 2408 Set-up-edit.tmp 84 PID 3892 wrote to memory of 4856 3892 Set-up-edit.exe 85 PID 3892 wrote to memory of 4856 3892 Set-up-edit.exe 85 PID 3892 wrote to memory of 4856 3892 Set-up-edit.exe 85 PID 4856 wrote to memory of 2156 4856 Set-up-edit.tmp 92 PID 4856 wrote to memory of 2156 4856 Set-up-edit.tmp 92 PID 4856 wrote to memory of 2156 4856 Set-up-edit.tmp 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Set-up-edit.exe"C:\Users\Admin\AppData\Local\Temp\Set-up-edit.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\is-3U85P.tmp\Set-up-edit.tmp"C:\Users\Admin\AppData\Local\Temp\is-3U85P.tmp\Set-up-edit.tmp" /SL5="$50262,2538135,133120,C:\Users\Admin\AppData\Local\Temp\Set-up-edit.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Set-up-edit.exe"C:\Users\Admin\AppData\Local\Temp\Set-up-edit.exe" /VERYSILENT3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\is-0I04A.tmp\Set-up-edit.tmp"C:\Users\Admin\AppData\Local\Temp\is-0I04A.tmp\Set-up-edit.tmp" /SL5="$501CC,2538135,133120,C:\Users\Admin\AppData\Local\Temp\Set-up-edit.exe" /VERYSILENT4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\is-N78IR.tmp\VideoSnapsh.exe"C:\Users\Admin\AppData\Local\Temp\is-N78IR.tmp\VideoSnapsh.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD57214dad1b9dd1ced2667de92c7c8e078
SHA19295ba2b3cac9657b32822bfba3a630748dbf008
SHA256ba0d49ab7a1bca57e56839e20f6d223ab292b9cfa47dd18888d50c31ae6f1b11
SHA512685caf77eb47662ae8c6cca1b760444b361fedc79eddb6bdeb37e88ffb4a8a0cd053e4f848a8f68a044d585fdd5139f659534ae9589d82622c4a7000321fd00b
-
Filesize
29KB
MD5fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d