Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2025 14:28

General

  • Target

    setup.exe

  • Size

    697.3MB

  • MD5

    383fa62b776e9a987e3487d3adb712dd

  • SHA1

    2002e387d4eebe5fcfc44faba49c353331f30450

  • SHA256

    62e6fc53e8a929fe7e8000e613bdd50917dd0ef303c5cace46a65ceb6a495b8b

  • SHA512

    65ee4a72ec06540f4aa350f672fda31e507e66e49ca3b75bc761b044e144371f6a3d76430ea60847518c67458531e017864565b96f27686511a6773995255dfe

  • SSDEEP

    98304:PpaOTEikjpnQ1Ow/V0vkFVuvRHyqP4wLR:Pp9IVNR3wwL

Malware Config

Extracted

Family

lumma

C2

https://brixghtquest.cyou/api

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2336-0-0x0000000000370000-0x00000000003CA000-memory.dmp

    Filesize

    360KB

  • memory/2336-1-0x0000000000370000-0x00000000003CA000-memory.dmp

    Filesize

    360KB

  • memory/2336-3-0x0000000000400000-0x00000000014B2000-memory.dmp

    Filesize

    16.7MB