Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2025, 19:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Installer.exe
-
Size
534KB
-
MD5
3e0425febb1dab14a9c10b27bbba983a
-
SHA1
95c4e5e0434161282e2c814910c7d31078c07ad7
-
SHA256
76329179e59265943bcded2afa641b2ab7991cb46ec56aaa6338d4ab455c4098
-
SHA512
0414066a1d1e66db4e0c713679ba18b868a75652a2a415e1a7af5fc4bede762a3c33f7112d1f9fb67c78b2af533d51c3a3b7b2fe8cc54918b1049d6b8d2696c3
-
SSDEEP
12288:CZkEb6EcwNbyvi1bWSKAMZpGiac5D3YM8hOe96NMyuhVbN6G:AbyvmWSKADiaA3YjEe96NM5Vh
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3728 set thread context of 3792 3728 Installer.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 3308 3728 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3728 wrote to memory of 3792 3728 Installer.exe 85 PID 3728 wrote to memory of 3792 3728 Installer.exe 85 PID 3728 wrote to memory of 3792 3728 Installer.exe 85 PID 3728 wrote to memory of 3792 3728 Installer.exe 85 PID 3728 wrote to memory of 3792 3728 Installer.exe 85 PID 3728 wrote to memory of 3792 3728 Installer.exe 85 PID 3728 wrote to memory of 3792 3728 Installer.exe 85 PID 3728 wrote to memory of 3792 3728 Installer.exe 85 PID 3728 wrote to memory of 3792 3728 Installer.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 8202⤵
- Program crash
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3728 -ip 37281⤵PID:4648