Analysis
-
max time kernel
76s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 17:35
Static task
static1
Behavioral task
behavioral1
Sample
nonia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
nonia.exe
Resource
win10v2004-20250207-en
General
-
Target
nonia.exe
-
Size
6.9MB
-
MD5
cd2b81a5b3709ce225dd36155fcc03ff
-
SHA1
79392c7e57ea1638c45e889130a42ac01cd989cd
-
SHA256
1ba86c6926a17e77c941f65901e97d88b20bf2508e1d75adf2495344022c4511
-
SHA512
5813cd0596d3d2b799538e0404a9a7141c4cc764737c04e0402f27c34ed3d076641f255b7420fd662fbb5a73cf287b810e314888709cea7709bbfb13cfeeebc4
-
SSDEEP
98304:rt2cot2nE0QOVqf0oisTLhLh/ExNqoT3K4zLuY7CqwGg/KqC4g5SZtmaoXAPn54E:rtnit0odL//ExNqoTaALuHwoQa
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://berserkyfir.click/api
Extracted
cryptbot
http://home.fortenb14vs.top/YEmCCeRRAnLfomQYkhCt57
Signatures
-
Cryptbot family
-
Lumma family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF Set-up.exe -
Executes dropped EXE 2 IoCs
pid Process 2756 LummaC2.exe 2912 Set-up.exe -
Loads dropped DLL 7 IoCs
pid Process 796 nonia.exe 796 nonia.exe 796 nonia.exe 796 nonia.exe 1048 WerFault.exe 1048 WerFault.exe 1048 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0026000000018b89-13.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1048 2912 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nonia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2912 Set-up.exe 2912 Set-up.exe 2912 Set-up.exe 2912 Set-up.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 796 wrote to memory of 2756 796 nonia.exe 29 PID 796 wrote to memory of 2756 796 nonia.exe 29 PID 796 wrote to memory of 2756 796 nonia.exe 29 PID 796 wrote to memory of 2756 796 nonia.exe 29 PID 796 wrote to memory of 2912 796 nonia.exe 30 PID 796 wrote to memory of 2912 796 nonia.exe 30 PID 796 wrote to memory of 2912 796 nonia.exe 30 PID 796 wrote to memory of 2912 796 nonia.exe 30 PID 2912 wrote to memory of 1048 2912 Set-up.exe 31 PID 2912 wrote to memory of 1048 2912 Set-up.exe 31 PID 2912 wrote to memory of 1048 2912 Set-up.exe 31 PID 2912 wrote to memory of 1048 2912 Set-up.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\nonia.exe"C:\Users\Admin\AppData\Local\Temp\nonia.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\LummaC2.exe"C:\Users\Admin\AppData\Local\Temp\LummaC2.exe"2⤵
- Executes dropped EXE
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\Set-up.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 4683⤵
- Loads dropped DLL
- Program crash
PID:1048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD58da89b163d506be4a73b987517a1b9e4
SHA12e110cf5160c511fa3d5843e890b8e9316754f34
SHA256ea56e7f640355598346fa0b356699298314e25d809f3aa7cfce1804a3d1964e5
SHA512a85969bcda0b31caf0cec79f45bec068a498c7ac190fe17d7b7c03f88f5c91f5f6221fcc4fcb46604695d5b95e9047dfc1d2cf31207540c23e929fcca08d14f5
-
Filesize
6.6MB
MD520b05fdf49dd701d4909c9297fad4299
SHA1038202216057ccb9b7b8033f037f575204968e34
SHA2562731f544c596e1879e5547eb11557dea0858849388cad25c91057f08ac31328b
SHA51218b6d1414d1e47671c62c9ca6a933af6792be113067d57c990aa43bd1a034c0d788afd48aba04f687c69fe70d9f35825bc1a5b40d4a4b4573b76b23ec5a4ae1c