Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2025, 00:40
Static task
static1
1 signatures
General
-
Target
Loader.exe
-
Size
30.4MB
-
MD5
4c9a5353c4d128e5c91f62594541c809
-
SHA1
4693f7c7a7cb2271a0e586bd6ab9b3e99f1bd078
-
SHA256
df5f9d36a731e6dd23c036dc365fe852e2f5ceb865dba753950351b922a03590
-
SHA512
c1fdae552c7c8b497ee82779b05c08db6946565b620cd9c5deb7b521babd3012398cc3e0e0878aa51c0eb4bc1f5b6f6339eed0754a4f8def161b63d11687bbe0
-
SSDEEP
6144:bWAoFwzNQONDkBahgVWmoPZXOZNcb9s2Gxvh+U0rZOOzqPdYH211IpBB++53XwF5:bFbzyOND0ToEUbOn4UQXzqd9IpBB1u7
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 4472 2784 Loader.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 3112 2784 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2784 wrote to memory of 4472 2784 Loader.exe 84 PID 2784 wrote to memory of 4472 2784 Loader.exe 84 PID 2784 wrote to memory of 4472 2784 Loader.exe 84 PID 2784 wrote to memory of 4472 2784 Loader.exe 84 PID 2784 wrote to memory of 4472 2784 Loader.exe 84 PID 2784 wrote to memory of 4472 2784 Loader.exe 84 PID 2784 wrote to memory of 4472 2784 Loader.exe 84 PID 2784 wrote to memory of 4472 2784 Loader.exe 84 PID 2784 wrote to memory of 4472 2784 Loader.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 8482⤵
- Program crash
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2784 -ip 27841⤵PID:1088