Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 04:50
Static task
static1
Behavioral task
behavioral1
Sample
PsfLauncher32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PsfLauncher32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PsfRuntime32.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
PsfRuntime32.dll
Resource
win10v2004-20241007-en
General
-
Target
PsfLauncher32.exe
-
Size
409KB
-
MD5
bbfa1775487c17383c10899ab8f9de7b
-
SHA1
004724f3dde5ca8b5b51d2436b04898567d5dbcf
-
SHA256
49e941b4c194bb97db10466d29c7dfc4b557b70913b43acc21d2572a936970f4
-
SHA512
ab774c1c341350b54d3aefe9f0e2ed7048d714409c4e148eb26738a255fdaf0c402e07b17086b73bba724bd3916722cd93e730a0c878d511533289d78632200e
-
SSDEEP
12288:lFcYBTSR7FqCiiD/UIC7R8muz6gKSCxX4/m03PcdHSg:lK3dDMIW8CSCxIzPctSg
Malware Config
Extracted
lumma
https://latyoutw.cyou/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 1096 PsfLauncher32.exe -
Loads dropped DLL 1 IoCs
pid Process 1096 PsfLauncher32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1096 set thread context of 1888 1096 PsfLauncher32.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PsfLauncher32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PsfLauncher32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3792 PsfLauncher32.exe 1096 PsfLauncher32.exe 1096 PsfLauncher32.exe 1888 cmd.exe 1888 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1096 PsfLauncher32.exe 1888 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3792 wrote to memory of 1096 3792 PsfLauncher32.exe 85 PID 3792 wrote to memory of 1096 3792 PsfLauncher32.exe 85 PID 3792 wrote to memory of 1096 3792 PsfLauncher32.exe 85 PID 1096 wrote to memory of 1888 1096 PsfLauncher32.exe 86 PID 1096 wrote to memory of 1888 1096 PsfLauncher32.exe 86 PID 1096 wrote to memory of 1888 1096 PsfLauncher32.exe 86 PID 1096 wrote to memory of 1888 1096 PsfLauncher32.exe 86 PID 1888 wrote to memory of 3284 1888 cmd.exe 101 PID 1888 wrote to memory of 3284 1888 cmd.exe 101 PID 1888 wrote to memory of 3284 1888 cmd.exe 101 PID 1888 wrote to memory of 3284 1888 cmd.exe 101 PID 1888 wrote to memory of 3284 1888 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\PsfLauncher32.exe"C:\Users\Admin\AppData\Local\Temp\PsfLauncher32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Roaming\OKNService\PsfLauncher32.exeC:\Users\Admin\AppData\Roaming\OKNService\PsfLauncher32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:3284
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023KB
MD557c28e74d2fa37136b87569870d2da47
SHA1311be10c8344cb4f3bdf056e4fad730a2a368be5
SHA256132583eb330704eb878430e090f736b897fa36d5cc47aca5135c141ce34dc84c
SHA5129651220d8d35c741c49ec589d39d9d89543fc1cafd0a08c0488bc2fca1a93c16f63671e3aba1d3a96763eadd57c3c97731135c5dd152d55549b80adc2cfa7d15
-
Filesize
409KB
MD5bbfa1775487c17383c10899ab8f9de7b
SHA1004724f3dde5ca8b5b51d2436b04898567d5dbcf
SHA25649e941b4c194bb97db10466d29c7dfc4b557b70913b43acc21d2572a936970f4
SHA512ab774c1c341350b54d3aefe9f0e2ed7048d714409c4e148eb26738a255fdaf0c402e07b17086b73bba724bd3916722cd93e730a0c878d511533289d78632200e
-
Filesize
348KB
MD52f930c4a4290be73802a5d650d613203
SHA1fd98498a18edba028b4f590e7bd618ab7790391d
SHA256e4ed1603a409bbfe6b6cb2aed7bac31b4c2812011aed11622fe6a00128f8a3e7
SHA5125369b746856059da218e757bee86436c7c53828cccb7931245e8a96a6429eee6cc884103ee4b1ef678a595ff889933b22e938154b5a31e425340c7845a57b247
-
Filesize
783KB
MD5aae8d1be7e27e9e67d21182bb6187dec
SHA1e34c18c6a3f1b3501c4e986167a6cae819f7b69e
SHA256c30852584dc13abe0b412668fa539651a0bbd9f96eb4b1a262c5db2509452509
SHA512132429f04f07024f5e262abbd641676040db5149ee9bebca42dff0420807e0f0f56d51de034d77b554c90c6351b977f585de17d1db57540ebe5f499087a36dba
-
Filesize
41KB
MD5f5b53d748a52cb9e8ac03495d4ad4a65
SHA1f44d112bc5417f697057b03c307e9a4bf745d87e
SHA256543de0764080883065f0fef2e20835d89115f4caac7e9cc4c4a56f97fc24f28d
SHA512713ebfe302e76d38f24b7a07fe6f787c1b65bf5a3f615e87d36408464a9e40ca3f511405cea0e4674c0881a7c288232fd234bfaf1791475d21c98c54b177f8fe