Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192/Set-up.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192/Set-up.exe
Resource
win11-20250217-en
General
-
Target
✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192/Set-up.exe
-
Size
1.8MB
-
MD5
098ac4621ee0e855e0710710736c2955
-
SHA1
ce7b88657c3449d5d05591314aaa43bd3e32bdaa
-
SHA256
46afbf1cbd2e1b5e108c133d4079faddc7347231b0c48566fd967a3070745e7f
-
SHA512
3042785b81bd18b641f0a2b5d8aec8ef86f9bf1269421fb96d1db35a913e744eaff16d9da7a02c8001435d59befb9f26bc0bbfa6e794811abf4282ed68b185fe
-
SSDEEP
49152:GpjwrP6yVgBd39sUUzFti4aTotmIT3SxLmNKbx:GpjwrP6yKTOUmi4aTo1NK9
Malware Config
Extracted
lumma
https://powerful-avoids.sbs/api
https://motion-treesz.sbs/api
https://disobey-curly.sbs/api
https://leg-sate-boat.sbs/api
https://story-tense-faz.sbs/api
https://blade-govern.sbs/api
https://occupy-blushi.sbs/api
https://frogs-severz.sbs/api
https://other-rans.cyou/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 13 2760 msiexec.exe 15 2760 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 2744 2308 Set-up.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2308 Set-up.exe 2308 Set-up.exe 2308 Set-up.exe 2744 more.com 2744 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2308 Set-up.exe 2744 more.com -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2744 2308 Set-up.exe 30 PID 2308 wrote to memory of 2744 2308 Set-up.exe 30 PID 2308 wrote to memory of 2744 2308 Set-up.exe 30 PID 2308 wrote to memory of 2744 2308 Set-up.exe 30 PID 2308 wrote to memory of 2744 2308 Set-up.exe 30 PID 2744 wrote to memory of 2760 2744 more.com 32 PID 2744 wrote to memory of 2760 2744 more.com 32 PID 2744 wrote to memory of 2760 2744 more.com 32 PID 2744 wrote to memory of 2760 2744 more.com 32 PID 2744 wrote to memory of 2760 2744 more.com 32 PID 2744 wrote to memory of 2760 2744 more.com 32 PID 2744 wrote to memory of 2760 2744 more.com 32 PID 2744 wrote to memory of 2760 2744 more.com 32 PID 2744 wrote to memory of 2760 2744 more.com 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\✦Pα†¢н⚘𝓜ø𝔡℮яи💡𝐒єrℓℓ🔮𝐂𝓸𝑑𝑒✤𝐒єт𝓤ρ𝐌υℓтιTℓε=9192\Set-up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1.0MB
MD56bdb680fe19f2526f02b4ece75448cc1
SHA1e8cd0db94c6ce55c620c70db4f53ae4ef6fab823
SHA25650186ab2f2dcb2dc7a58f0da787d97cf68d3f6744016532390024c7b28a807b2
SHA5126217ac3455d5c34f5c029f9801ed9abf57f8f1874147759e74f1917578591ddfba8feb5b0b4db745e2914e3c030723bcaff564a99ff8a20f15b75580eb495eeb
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc