Analysis
-
max time kernel
90s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/03/2025, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192/Set-up.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192/Set-up.exe
Resource
win11-20250217-en
General
-
Target
❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192/Set-up.exe
-
Size
1.8MB
-
MD5
098ac4621ee0e855e0710710736c2955
-
SHA1
ce7b88657c3449d5d05591314aaa43bd3e32bdaa
-
SHA256
46afbf1cbd2e1b5e108c133d4079faddc7347231b0c48566fd967a3070745e7f
-
SHA512
3042785b81bd18b641f0a2b5d8aec8ef86f9bf1269421fb96d1db35a913e744eaff16d9da7a02c8001435d59befb9f26bc0bbfa6e794811abf4282ed68b185fe
-
SSDEEP
49152:GpjwrP6yVgBd39sUUzFti4aTotmIT3SxLmNKbx:GpjwrP6yKTOUmi4aTo1NK9
Malware Config
Extracted
lumma
https://powerful-avoids.sbs/api
https://motion-treesz.sbs/api
https://disobey-curly.sbs/api
https://leg-sate-boat.sbs/api
https://story-tense-faz.sbs/api
https://blade-govern.sbs/api
https://occupy-blushi.sbs/api
https://frogs-severz.sbs/api
https://other-rans.cyou/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 1952 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 3412 1688 Set-up.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1688 Set-up.exe 1688 Set-up.exe 1688 Set-up.exe 1688 Set-up.exe 3412 more.com 3412 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1688 Set-up.exe 3412 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3412 1688 Set-up.exe 81 PID 1688 wrote to memory of 3412 1688 Set-up.exe 81 PID 1688 wrote to memory of 3412 1688 Set-up.exe 81 PID 1688 wrote to memory of 3412 1688 Set-up.exe 81 PID 3412 wrote to memory of 1952 3412 more.com 83 PID 3412 wrote to memory of 1952 3412 more.com 83 PID 3412 wrote to memory of 1952 3412 more.com 83 PID 3412 wrote to memory of 1952 3412 more.com 83 PID 3412 wrote to memory of 1952 3412 more.com 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\❂↶Fяοм†Sωι†cн✦$ε†μρ✦Codε✦∀sα†Lωor❂🎶9192\Set-up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55bc1337462eb13b2a4b16d2ba77ab427
SHA1b50366c43b98d287ac12321fab3bfc64842e0d1e
SHA256768c935056285b9368070c56ce17b3077bbfeb7bf57a37e418cc5d3d814697f4
SHA512aa233b11ed02877933ae499836ba55c030995a3ecee1c10cf84e1c2f017019fa27bfa1b8945acdc063d719ff009ceb5691a01060cc454d768a77964f80b24c7a