Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
29/01/2025, 22:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Nihon.exe
Resource
win10ltsc2021-20250128-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
client.dll
Resource
win10ltsc2021-20250128-en
0 signatures
150 seconds
General
-
Target
Nihon.exe
-
Size
533KB
-
MD5
91d611c84f4b8aa6478e94460817fb37
-
SHA1
c1b758e840ccdf6b10a19e1bdbcfe284913670ba
-
SHA256
a81afd5fe711453f87ae10559bc3b716b17e5971e31749d3274369dd5868c291
-
SHA512
7963358bef8fa8db93d52ef107d941e068013c60b2ed275caa875549f9aa2608f2ffdb230eb872a398fbecfe6143af9ee5fb4a2bf703a4e713ad01902258807b
-
SSDEEP
12288:KZkEb6EcwNbyRbA+MDxqSLLEPcOiQavOs0:YbyRbVSLLPOgOs0
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3828 set thread context of 3052 3828 Nihon.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 4296 3828 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nihon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nihon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3828 wrote to memory of 556 3828 Nihon.exe 83 PID 3828 wrote to memory of 556 3828 Nihon.exe 83 PID 3828 wrote to memory of 556 3828 Nihon.exe 83 PID 3828 wrote to memory of 3052 3828 Nihon.exe 84 PID 3828 wrote to memory of 3052 3828 Nihon.exe 84 PID 3828 wrote to memory of 3052 3828 Nihon.exe 84 PID 3828 wrote to memory of 3052 3828 Nihon.exe 84 PID 3828 wrote to memory of 3052 3828 Nihon.exe 84 PID 3828 wrote to memory of 3052 3828 Nihon.exe 84 PID 3828 wrote to memory of 3052 3828 Nihon.exe 84 PID 3828 wrote to memory of 3052 3828 Nihon.exe 84 PID 3828 wrote to memory of 3052 3828 Nihon.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nihon.exe"C:\Users\Admin\AppData\Local\Temp\Nihon.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\Nihon.exe"C:\Users\Admin\AppData\Local\Temp\Nihon.exe"2⤵PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\Nihon.exe"C:\Users\Admin\AppData\Local\Temp\Nihon.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 8362⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3828 -ip 38281⤵PID:232