Overview
overview
10Static
static
3FNP_Act_Installer.dll
windows7-x64
3FNP_Act_Installer.dll
windows10-2004-x64
3ISUIServices.dll
windows7-x64
3ISUIServices.dll
windows10-2004-x64
3MSIMG32.dll
windows7-x64
3MSIMG32.dll
windows10-2004-x64
3TSConfig.exe
windows7-x64
3TSConfig.exe
windows10-2004-x64
10ToolkitPro...0U.dll
windows7-x64
3ToolkitPro...0U.dll
windows10-2004-x64
3mfc140u.dll
windows7-x64
3mfc140u.dll
windows10-2004-x64
3msvcp140.dll
windows7-x64
3msvcp140.dll
windows10-2004-x64
3vcruntime140.dll
windows7-x64
3vcruntime140.dll
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 20:47
Static task
static1
Behavioral task
behavioral1
Sample
FNP_Act_Installer.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
FNP_Act_Installer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ISUIServices.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
ISUIServices.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
MSIMG32.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
MSIMG32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
TSConfig.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
TSConfig.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ToolkitPro2200vc170U.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
ToolkitPro2200vc170U.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
mfc140u.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
mfc140u.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
msvcp140.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
msvcp140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
vcruntime140.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
vcruntime140.dll
Resource
win10v2004-20241007-en
General
-
Target
TSConfig.exe
-
Size
1.8MB
-
MD5
e367ccd75b44a581b76040040df16eea
-
SHA1
127c1fae3f28ddcecf09050ad7191cd9c6b7f482
-
SHA256
d364a62a725b5f5d6ff6b3ffcaf3bf5086e80ee3ecb8d7e182876fce557579b2
-
SHA512
89ea1143aaf28253c6a6e044a92b7822923a95fc7b08142028f8b8b64166e32c2c6deb68f48b84170b907809c7ecbcea6d7eadb97d827b7f99b663a4dac65060
-
SSDEEP
24576:cA+yMgvxQWLCMhXMS8tzkXmPVUo4xSF9YxOnV7HwplZeQlBH9+IZCXjLQ4Lpp7eG:dx2MhXMa9+IeQ4+0uXOdmQHKPeB
Malware Config
Extracted
lumma
https://abnomrmakio.cyou/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1028 set thread context of 4876 1028 TSConfig.exe 83 -
Executes dropped EXE 1 IoCs
pid Process 1028 TSConfig.exe -
Loads dropped DLL 8 IoCs
pid Process 1028 TSConfig.exe 1028 TSConfig.exe 1028 TSConfig.exe 1028 TSConfig.exe 1028 TSConfig.exe 1028 TSConfig.exe 1028 TSConfig.exe 1028 TSConfig.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TSConfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TSConfig.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1236 TSConfig.exe 1028 TSConfig.exe 1028 TSConfig.exe 4876 cmd.exe 4876 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1028 TSConfig.exe 4876 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1028 1236 TSConfig.exe 82 PID 1236 wrote to memory of 1028 1236 TSConfig.exe 82 PID 1236 wrote to memory of 1028 1236 TSConfig.exe 82 PID 1028 wrote to memory of 4876 1028 TSConfig.exe 83 PID 1028 wrote to memory of 4876 1028 TSConfig.exe 83 PID 1028 wrote to memory of 4876 1028 TSConfig.exe 83 PID 1028 wrote to memory of 4876 1028 TSConfig.exe 83 PID 4876 wrote to memory of 1136 4876 cmd.exe 85 PID 4876 wrote to memory of 1136 4876 cmd.exe 85 PID 4876 wrote to memory of 1136 4876 cmd.exe 85 PID 4876 wrote to memory of 1136 4876 cmd.exe 85 PID 4876 wrote to memory of 1136 4876 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\TSConfig.exe"C:\Users\Admin\AppData\Local\Temp\TSConfig.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Roaming\WY_Signv2\TSConfig.exeC:\Users\Admin\AppData\Roaming\WY_Signv2\TSConfig.exe2⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD59ea2169d72026413bcb343224c3924da
SHA1fcb58819e7b0abd0626cdb754a7b8299d462286c
SHA256d6bccb3a48b137cf674e9af0ef80b16736e7520684c26cf6ea98c6d0499a7248
SHA51221a6505ec50b4755632462b32876f13a9b9994344b23d6e38968ebf8b6d75d170a4c8bfca36abb7f29b5299b12bb91b3c707852217029561aac0d7852a23fec4
-
Filesize
3.3MB
MD5bd1341856f0f5f8db5d54401c0d3261c
SHA1b6f9287fd2da120e3a69aefdbcce8230582542af
SHA2564c08963572d2e9d80782221c2a0d7633c72e6eb3ed8d364b8a512441ec5d774f
SHA51242e816fc9a630831453f4ce5080586500a415e098b2e2a14005e9c39a4c5b87cd1682f3060cba7490dc42117f53ec5951f2dc14181981017455cb1a14e93c06b
-
Filesize
7.7MB
MD53b81ed520d9dde9c78a9aa9ec5bcc205
SHA125a9730125f20232bebd09bf17c224647a04dce9
SHA256276f328fdf9df6c5094bee29f10576bbb3b78dc853fb4cd344038ed857099dbd
SHA5121a2cbfd7c422428dcd2ff7ed684c52abfb307f61ebdfaf64bdcddbfa36ef97092c6e52b9c9ec0c001ab5d6f7b92453b7099499ace333530b414a8a6ccf221bb5
-
Filesize
3KB
MD5ae2fb3295fd4bee1e651b7b6639d7bfe
SHA14ac939d67002aabccf7a5878302a37b8079dda12
SHA256c1f88d099af72cae6f6baaf7473da78279dc50b112f7fb68f93b5c3f29051c45
SHA51290c2adc288547a2fec7bf6865b1341f2708ecf1e9ca78e0e440de008c5b032192998a42de0359f267e51d7ed8ee6a8e3ecc007d002d394cc5629cb81d94e9db9
-
Filesize
1.8MB
MD5e367ccd75b44a581b76040040df16eea
SHA1127c1fae3f28ddcecf09050ad7191cd9c6b7f482
SHA256d364a62a725b5f5d6ff6b3ffcaf3bf5086e80ee3ecb8d7e182876fce557579b2
SHA51289ea1143aaf28253c6a6e044a92b7822923a95fc7b08142028f8b8b64166e32c2c6deb68f48b84170b907809c7ecbcea6d7eadb97d827b7f99b663a4dac65060
-
Filesize
10.5MB
MD58a7fb716d57df2d2ed06be3b72f49bcc
SHA1a9736b0ad1c9369bb3b470fa7901599eac4c1ba2
SHA2561c2d5be623c48e8564c5d3bd44ad729e4b70b961891b7144208561b3a989baba
SHA512560c2106275adc4741f84e35d870de91695e26c0ae252b026a8641cd630c79dfe4d49dfb60fea0d62319b9e55f9be5ee07cce6cd28991a7f28405dda46bb835f
-
Filesize
88KB
MD51d4ff3cf64ab08c66ae9a4013c89a3ac
SHA1f9ee15d0e9b0b7e04ff4c8a5de5afcffe8b2527b
SHA25665f620bc588d95fe2ed236d1602e49f89077b434c83102549eed137c7fdc7220
SHA51265fbd68843280e933620c470e524fba993ab4c48ede4bc0917b4ebe25da0408d02daec3f5afcd44a3ff8aba676d2eff2dda3f354029d27932ef39c9fdea51c26
-
Filesize
64KB
MD5e503e0ba8b4d79b2819b7baa42722434
SHA1be43d0403a586ccea8de1d81d0f82680377258b1
SHA256c91505d28daa0f562316b004fe32c7dbd00369d9b6d032cbf12a2c888957d9af
SHA512d47b4edbe802edaf4c056c71827e84edec3471fa1691ac3c5a0bc9bc38ee7f3d14355ac0c145acc9990ac02d0d5d53a8d9a8ec440d3ed1ade3a308349312d315
-
Filesize
799KB
MD5c40ab6b34c7d721fd131762879b56286
SHA133e6d6988e3a0ae32fc3efb61da64fcb5debc83c
SHA256568459b5a59243d37efe2722b352c508a87520b08dbb940066c2ebba4e9bce08
SHA5122d1b7351d0ea7c6883e73a65392f0deb8212178cc64c61c338a2356002883843b2a4c1953a537c6285127eaa9d9228b149f1bf7591fa24a63095be102b31d590
-
Filesize
4.6MB
MD5266c6a0adda7ca07753636b1f8a69f7f
SHA1996cc22086168cd47a19384117ee61e9eb03f99a
SHA2563f8176bbc33f75fbcc429800461d84bcdb92d766d968220a9cc31f4cf6987271
SHA512016c3197a089e68145741a74d6fb2749d45d0760cdb471c9c4efc17b365b0c0dfddd7ca331d5a6fad441485c382b382eab6ed9aca80640a540fed36c6905125c
-
Filesize
437KB
MD5dc739066c9d0ca961cba2f320cade28e
SHA181ed5f7861e748b90c7ae2d18da80d1409d1fa05
SHA25674e9268a68118bb1ac5154f8f327887715960ccc37ba9dabbe31ecd82dcbaa55
SHA5124eb181984d989156b8703fd8bb8963d7a5a3b7f981fe747c6992993b7a1395a21f45dbedf08c1483d523e772bdf41330753e1771243b53da36d2539c01171cf1