Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12-02-2025 14:32
Behavioral task
behavioral1
Sample
Get__File𝔃/setup.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Get__File𝔃/setup.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
Get__File𝔃/setup.exe
-
Size
697.3MB
-
MD5
32f57bd28256571f9802a594d310c987
-
SHA1
a0c047b57c554aeae98a5cd1990f5e8eec03f740
-
SHA256
6c25f32e6e5f179833a56b8872a487f416597565bd1f4976fea154ad0071ae43
-
SHA512
591f8890093f7fc3fca1a01f82d84e0d7f7420736cb7fafcab1b6e50b2ac28f0c0f726847ba72f0da219dc4275b13362ad1b007977b1b327e29fdc37a2d7b15e
-
SSDEEP
98304:SpaOTEikjpnQ1Ow/V0vkFVuvRHyqP4wVrozQ3:Sp9IVNR3ww5
Malware Config
Extracted
lumma
https://calfmhaven.cyou/api
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 3132 vcpkgsrv.exe 4348 vcpkgsrv.exe -
Loads dropped DLL 8 IoCs
pid Process 3132 vcpkgsrv.exe 3132 vcpkgsrv.exe 3132 vcpkgsrv.exe 3132 vcpkgsrv.exe 4348 vcpkgsrv.exe 4348 vcpkgsrv.exe 4348 vcpkgsrv.exe 4348 vcpkgsrv.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4348 set thread context of 824 4348 vcpkgsrv.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcpkgsrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcpkgsrv.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3368 setup.exe 3368 setup.exe 3368 setup.exe 3368 setup.exe 3368 setup.exe 3368 setup.exe 3132 vcpkgsrv.exe 4348 vcpkgsrv.exe 4348 vcpkgsrv.exe 824 choice.exe 824 choice.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4348 vcpkgsrv.exe 824 choice.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3368 wrote to memory of 3132 3368 setup.exe 91 PID 3368 wrote to memory of 3132 3368 setup.exe 91 PID 3368 wrote to memory of 3132 3368 setup.exe 91 PID 3132 wrote to memory of 4348 3132 vcpkgsrv.exe 92 PID 3132 wrote to memory of 4348 3132 vcpkgsrv.exe 92 PID 3132 wrote to memory of 4348 3132 vcpkgsrv.exe 92 PID 4348 wrote to memory of 824 4348 vcpkgsrv.exe 93 PID 4348 wrote to memory of 824 4348 vcpkgsrv.exe 93 PID 4348 wrote to memory of 824 4348 vcpkgsrv.exe 93 PID 4348 wrote to memory of 824 4348 vcpkgsrv.exe 93 PID 824 wrote to memory of 3812 824 choice.exe 95 PID 824 wrote to memory of 3812 824 choice.exe 95 PID 824 wrote to memory of 3812 824 choice.exe 95 PID 824 wrote to memory of 3812 824 choice.exe 95 PID 824 wrote to memory of 3812 824 choice.exe 95 PID 824 wrote to memory of 3812 824 choice.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Get__File𝔃\setup.exe"C:\Users\Admin\AppData\Local\Temp\Get__File𝔃\setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\YZYMBSR1U9PNX5N6HFLT0J46DX\vcpkgsrv.exe"C:\Users\Admin\AppData\Local\Temp\YZYMBSR1U9PNX5N6HFLT0J46DX\vcpkgsrv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\ProgramData\FNPLicensingService\vcpkgsrv.exeC:\ProgramData\FNPLicensingService\vcpkgsrv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\choice.exeC:\Windows\SysWOW64\choice.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5f36dae6ea00f102b60a5011af0732123
SHA106fabdbf1fa14b5a637716f9f7a28c95ea4a8661
SHA2560a3894dd420ed6b4c7ebbde463dbbde69cdb032e290b1c86c21ccdaa4da95526
SHA512c585e25ac9d733ca82d36d4cee0fa5f7d34a0455c359e010c501d1474c612bc73429093ba302ae14222d7e3a89d5b11777529b3005c7c0966aff06c92c7cce12
-
Filesize
5.7MB
MD593fd78e011ac0e5255ed8bc3d652fd13
SHA1ffe198e7a0ebb879c5ab6446a96894b5784cdc13
SHA256dac4389e990c7238ba6ee08e0505cea5ddabaf4d8dc38354c47d18de1624f43d
SHA512fa2952f8028a088546e2b667cb9bb9d11258626dabc918bd3119c2d92d18b2caeddd2191e2f54c4813fbbe3a0299c7cb8ad3d05030a16f435c6ccf6e84f9fdee
-
Filesize
55KB
MD5ac65af3eb9bada3d75d7f2c9f86d8273
SHA1f4b75c457b32bba5352dca361ef3c477ff0b5c23
SHA256e68bce3f61193576d743fcd7f4cf6ce98ca57b0e3db3ca2bc46d41ccf0d5b9a9
SHA5121bbd5ac6fdad7a3305598a37235b32cb8c85282fe2a746b1dd5b4e63f06d1a10ed31972ee614d888e22b431dc37a2d2043ed98d879300bc90d60ea7e9feb1094
-
Filesize
438KB
MD5cdae969102e88f6704d853f9521eedd2
SHA13d9a57652a3634cb9b5a83c973c1c77b30c60bf4
SHA2564ad3de3443d7658f74c978e7eb04730e3d812bc592fee47be4e6348d1fb4814e
SHA5126714f7886ed21a97a3d70e8a55637f0d0e6d2c43ffd433e7f9c38c100ada99c6aaf136135b5fa6b77483987e34f4c57086c574309b798512cd668c54f845ec49
-
Filesize
1.4MB
MD538901633c833cba7f682472ced0dbe4b
SHA10c11a1ac834d2b270ba60f3605109933ca11a7f0
SHA256a5c5487194f761dac90e178c9c1753c0f47b041f3168b5c23a587f33f69e5089
SHA51270d71197c68c9a92883c482aee76978e2a01e785be6fb3b6082369e25d991d3e03d8467e11d87493e54f5a3dc4bcd59fa588f0fabe5f6fdcf3361de95cb471c1
-
Filesize
88KB
MD5984c36e57e47581e267151aca04e9580
SHA1aa54e9133ba3ed675f9b5255a515780438163ae1
SHA256e0850ad7c2431f822359e129c85b708373759a1aaadb70b3740642ea44345a04
SHA5129c8ce4e86173066ab8584a08aa1449f36808f0abd6de01a86f83914a44a8b07b31266c1f38ec0cd46faabf819ac6e1c74e29d5b8b2163ac5d9e1797df8282fdf
-
Filesize
6.3MB
MD5d5569774c081f83226981fff4ddbf64d
SHA1fcb2fe0e50787cb5371ad3bfe2db33b35ef3c1b1
SHA25653f73aaf7634eaee11614a774790aab75b0946a0ff909212d0c2e6c836025767
SHA5123da053e08b196edd99a9a2a17955776b6a3c0443c64adf7ca0159676d5c5e57f2b2826935e9ca7aad52572208549329eeabbd91d29faa79a1095ebc743f2b7ee