Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/03/2025, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192/Set-up.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192/Set-up.exe
Resource
win11-20250217-en
General
-
Target
✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192/Set-up.exe
-
Size
1.8MB
-
MD5
098ac4621ee0e855e0710710736c2955
-
SHA1
ce7b88657c3449d5d05591314aaa43bd3e32bdaa
-
SHA256
46afbf1cbd2e1b5e108c133d4079faddc7347231b0c48566fd967a3070745e7f
-
SHA512
3042785b81bd18b641f0a2b5d8aec8ef86f9bf1269421fb96d1db35a913e744eaff16d9da7a02c8001435d59befb9f26bc0bbfa6e794811abf4282ed68b185fe
-
SSDEEP
49152:GpjwrP6yVgBd39sUUzFti4aTotmIT3SxLmNKbx:GpjwrP6yKTOUmi4aTo1NK9
Malware Config
Extracted
lumma
https://powerful-avoids.sbs/api
https://motion-treesz.sbs/api
https://disobey-curly.sbs/api
https://leg-sate-boat.sbs/api
https://story-tense-faz.sbs/api
https://blade-govern.sbs/api
https://occupy-blushi.sbs/api
https://frogs-severz.sbs/api
https://other-rans.cyou/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 30 1412 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1340 set thread context of 3932 1340 Set-up.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1340 Set-up.exe 1340 Set-up.exe 1340 Set-up.exe 1340 Set-up.exe 3932 more.com 3932 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1340 Set-up.exe 3932 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1340 wrote to memory of 3932 1340 Set-up.exe 88 PID 1340 wrote to memory of 3932 1340 Set-up.exe 88 PID 1340 wrote to memory of 3932 1340 Set-up.exe 88 PID 1340 wrote to memory of 3932 1340 Set-up.exe 88 PID 3932 wrote to memory of 1412 3932 more.com 92 PID 3932 wrote to memory of 1412 3932 more.com 92 PID 3932 wrote to memory of 1412 3932 more.com 92 PID 3932 wrote to memory of 1412 3932 more.com 92 PID 3932 wrote to memory of 1412 3932 more.com 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192\Set-up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5498757ebc5d96b8d0aee22cfe9b8891c
SHA12507023e847adee42e34d449ad5be1805ed6a07c
SHA2561eeb7aaa3d1a05686bf1e4a9e8afd86c9cb230fa6ffa88b588719055a8594e2a
SHA512b7cc605c40f3168bbd48762a47b98bb873ba9dd91ccb4242f6cf4f168ba97791e294acbf47ad1a127c7d31af5df8caecf8be5f4010ea080204afd0488e9e662a