Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2025, 14:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
loader.exe
-
Size
545KB
-
MD5
979de771eb4ff270e0348eb4832fd28e
-
SHA1
41b8177bf912dd148ce33d0f89479a684cc3dddf
-
SHA256
bd19b230e4650d53868b2a5adb9b4cac495b06c6880ee3fd7e3fa87adbb9a282
-
SHA512
210842e3a5247ee2f95c9c4b234059354b43b275756c2b8f4c0fdd0bb6b5107ff44ca27a8cb9a14ef94c8d8769ad4341f542a3d9d9b88c54950a2689924d34e7
-
SSDEEP
12288:lZkEb6EcwNby2j0jZ5hQ0CCpvQJYo2lxrxPNP2:Lby2juZM0V82f1PNO
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 556 set thread context of 828 556 loader.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 4032 556 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 556 wrote to memory of 828 556 loader.exe 85 PID 556 wrote to memory of 828 556 loader.exe 85 PID 556 wrote to memory of 828 556 loader.exe 85 PID 556 wrote to memory of 828 556 loader.exe 85 PID 556 wrote to memory of 828 556 loader.exe 85 PID 556 wrote to memory of 828 556 loader.exe 85 PID 556 wrote to memory of 828 556 loader.exe 85 PID 556 wrote to memory of 828 556 loader.exe 85 PID 556 wrote to memory of 828 556 loader.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 8162⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 556 -ip 5561⤵PID:2584