Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2025, 14:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
Installer.exe
-
Size
541KB
-
MD5
c13ae6f97f5518fe8ca5b09f6aeb4c68
-
SHA1
d9219dade233d3cb0c59f57e4400dbff8e08eb66
-
SHA256
a2480b11ad87b6c98776b74d0ca75739559c6d357ddcc786bbf5565f91154095
-
SHA512
d5edf8397b686cdc12fe901739c88769386c06e108e8e61a9e1b14cf1abc78ac9edefc0b9e4b8d5595e47fdb0c2ef9155010ce643ebe1913b0a207620e567506
-
SSDEEP
12288:jY6R+JQXjAnN3ykQO4L3yq7HFe9/jAoaLSsysL2nmb0j:1TARQOS3ySY9/jA2l+0
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1224 set thread context of 3104 1224 Installer.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4052 1224 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1224 wrote to memory of 3104 1224 Installer.exe 83 PID 1224 wrote to memory of 3104 1224 Installer.exe 83 PID 1224 wrote to memory of 3104 1224 Installer.exe 83 PID 1224 wrote to memory of 3104 1224 Installer.exe 83 PID 1224 wrote to memory of 3104 1224 Installer.exe 83 PID 1224 wrote to memory of 3104 1224 Installer.exe 83 PID 1224 wrote to memory of 3104 1224 Installer.exe 83 PID 1224 wrote to memory of 3104 1224 Installer.exe 83 PID 1224 wrote to memory of 3104 1224 Installer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 8282⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1224 -ip 12241⤵PID:4948