Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2025, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
8 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
493KB
-
MD5
7665e12873e7954d1934f9fb5b44b404
-
SHA1
dde259cf50ce63395a0c4e786c853bff6a381841
-
SHA256
f361f433a4712ad54e806133334f62de0baa776da7a6a3548db077c4e6808e6e
-
SHA512
f3ee707328568992857d838257f0f1f63edef6aa7762d59085ad47cf691ecfbca0c1413da25a06f86d72f8671e2879c7a090ade02029dd1cc0e14f21007e9bf1
-
SSDEEP
12288:aL02PC/hl6XALf/2THXzYnHu9DI5DPibvBghJ:aI2P8h84qYHi6oBghJ
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1512 set thread context of 2764 1512 Setup.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3012 1512 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2764 1512 Setup.exe 83 PID 1512 wrote to memory of 2764 1512 Setup.exe 83 PID 1512 wrote to memory of 2764 1512 Setup.exe 83 PID 1512 wrote to memory of 2764 1512 Setup.exe 83 PID 1512 wrote to memory of 2764 1512 Setup.exe 83 PID 1512 wrote to memory of 2764 1512 Setup.exe 83 PID 1512 wrote to memory of 2764 1512 Setup.exe 83 PID 1512 wrote to memory of 2764 1512 Setup.exe 83 PID 1512 wrote to memory of 2764 1512 Setup.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 10082⤵
- Program crash
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1512 -ip 15121⤵PID:2168