Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2025, 14:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Loader.exe
-
Size
395KB
-
MD5
d77614f7ea4b89a831874b3dfdd909a9
-
SHA1
69274a7177d81ff53e1f5ad6577035bc082f4bce
-
SHA256
9f9004cec568da6b1b35447ae42e9482df421162a32fcdca5b91fa78128e6efe
-
SHA512
89b81e244bf7363bdce32663c4e5dd4ff99cd1d1ca12d3311e40f0ddc96494d79f95892e44cc2a3bcbfdd81e24749960c7240b1179d94c8f298ceaaa498f03e1
-
SSDEEP
6144:7WAoFwzNQONWylo7HJ7grXn9t97k8zq3K0saL0oo/kAczM2ZcIjg1iLA/nmol2nF:7FbzyONWyq7HFe9/jAoaLSsysL2nmq0j
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3644 set thread context of 2352 3644 Loader.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4904 3644 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3644 wrote to memory of 1492 3644 Loader.exe 82 PID 3644 wrote to memory of 1492 3644 Loader.exe 82 PID 3644 wrote to memory of 1492 3644 Loader.exe 82 PID 3644 wrote to memory of 2352 3644 Loader.exe 83 PID 3644 wrote to memory of 2352 3644 Loader.exe 83 PID 3644 wrote to memory of 2352 3644 Loader.exe 83 PID 3644 wrote to memory of 2352 3644 Loader.exe 83 PID 3644 wrote to memory of 2352 3644 Loader.exe 83 PID 3644 wrote to memory of 2352 3644 Loader.exe 83 PID 3644 wrote to memory of 2352 3644 Loader.exe 83 PID 3644 wrote to memory of 2352 3644 Loader.exe 83 PID 3644 wrote to memory of 2352 3644 Loader.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 8242⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3644 -ip 36441⤵PID:4848