Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/03/2025, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192/Set-up.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192/Set-up.exe
Resource
win11-20250217-en
General
-
Target
❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192/Set-up.exe
-
Size
1.8MB
-
MD5
098ac4621ee0e855e0710710736c2955
-
SHA1
ce7b88657c3449d5d05591314aaa43bd3e32bdaa
-
SHA256
46afbf1cbd2e1b5e108c133d4079faddc7347231b0c48566fd967a3070745e7f
-
SHA512
3042785b81bd18b641f0a2b5d8aec8ef86f9bf1269421fb96d1db35a913e744eaff16d9da7a02c8001435d59befb9f26bc0bbfa6e794811abf4282ed68b185fe
-
SSDEEP
49152:GpjwrP6yVgBd39sUUzFti4aTotmIT3SxLmNKbx:GpjwrP6yKTOUmi4aTo1NK9
Malware Config
Extracted
lumma
https://powerful-avoids.sbs/api
https://motion-treesz.sbs/api
https://disobey-curly.sbs/api
https://leg-sate-boat.sbs/api
https://story-tense-faz.sbs/api
https://blade-govern.sbs/api
https://occupy-blushi.sbs/api
https://frogs-severz.sbs/api
https://other-rans.cyou/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 28 2068 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3060 set thread context of 4656 3060 Set-up.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3060 Set-up.exe 3060 Set-up.exe 3060 Set-up.exe 3060 Set-up.exe 4656 more.com 4656 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3060 Set-up.exe 4656 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3060 wrote to memory of 4656 3060 Set-up.exe 84 PID 3060 wrote to memory of 4656 3060 Set-up.exe 84 PID 3060 wrote to memory of 4656 3060 Set-up.exe 84 PID 3060 wrote to memory of 4656 3060 Set-up.exe 84 PID 4656 wrote to memory of 2068 4656 more.com 88 PID 4656 wrote to memory of 2068 4656 more.com 88 PID 4656 wrote to memory of 2068 4656 more.com 88 PID 4656 wrote to memory of 2068 4656 more.com 88 PID 4656 wrote to memory of 2068 4656 more.com 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192\Set-up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5c1f828b1b74ac7392d146eee4bf57c43
SHA15d1a478060a12bae2df4561f573c39dbdf6f67ea
SHA256d4bdb269153e09843a4bd08989720519248eb70bb940c8d9676d379da0f4c207
SHA5128e00ab1c21c08f1c046cbb58cce2238d5477860adb79cfd813bc8f4508ac1c2bbbd11da4eebce8c5b0c0b6d5efa3581dfd802bb4fe207ca151dec99d5ab7a802