Overview
overview
10Static
static
3Mal2/Comn.dll
windows7-x64
3Mal2/Comn.dll
windows10-2004-x64
3Mal2/QtCore4.dll
windows7-x64
3Mal2/QtCore4.dll
windows10-2004-x64
3Mal2/QtGui4.dll
windows7-x64
3Mal2/QtGui4.dll
windows10-2004-x64
3Mal2/Set-up.exe
windows7-x64
10Mal2/Set-up.exe
windows10-2004-x64
10Mal2/breast.html
windows7-x64
3Mal2/breast.html
windows10-2004-x64
4Mal2/libcr..._1.dll
windows7-x64
3Mal2/libcr..._1.dll
windows10-2004-x64
3Mal2/libssl-1_1.dll
windows7-x64
3Mal2/libssl-1_1.dll
windows10-2004-x64
3Mal2/msvcp80.dll
windows7-x64
3Mal2/msvcp80.dll
windows10-2004-x64
3Mal2/msvcr80.dll
windows7-x64
3Mal2/msvcr80.dll
windows10-2004-x64
3Analysis
-
max time kernel
55s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/03/2025, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
Mal2/Comn.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Mal2/Comn.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
Mal2/QtCore4.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Mal2/QtCore4.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Mal2/QtGui4.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Mal2/QtGui4.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Mal2/Set-up.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Mal2/Set-up.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Mal2/breast.html
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
Mal2/breast.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
Mal2/libcrypto-1_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Mal2/libcrypto-1_1.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
Mal2/libssl-1_1.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Mal2/libssl-1_1.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
Mal2/msvcp80.dll
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
Mal2/msvcp80.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
Mal2/msvcr80.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Mal2/msvcr80.dll
Resource
win10v2004-20250314-en
General
-
Target
Mal2/Set-up.exe
-
Size
335KB
-
MD5
61dc7844b70f4e6ffce0ec875dcc7faf
-
SHA1
436a95a2135264bacaae51f6aa6a60c2ad6308c7
-
SHA256
6ca9becba92609d2974352a205725346c696e864d087b63ea2afabd52707fb87
-
SHA512
bbf2ce889e76a024b5c85b84b544608526b3a460f9751d3b2aa51a404f517705dc6d40756caa8071a65271e67791a16fb2bbbbc4d0b78c93e670c96404fba765
-
SSDEEP
6144:k32qf6qqDdoAZrdsTs/88TuIc4vlico6CUwtXHQgO6aFuO:k32qKRfiTKNyGFuO
Malware Config
Extracted
lumma
https://partparcadi.shop/api
https://crosshairc.life/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://plegenassedk.top/api
https://htardwarehu.icu/api
https://jcjlaspcorne.icu/api
https://bugildbett.top/api
https://weaponrywo.digital/api
Signatures
-
Lumma family
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2284 set thread context of 2576 2284 Set-up.exe 29 PID 2576 set thread context of 2732 2576 more.com 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2284 Set-up.exe 2284 Set-up.exe 2576 more.com 2576 more.com 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2284 Set-up.exe 2576 more.com 2576 more.com -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2576 2284 Set-up.exe 29 PID 2284 wrote to memory of 2576 2284 Set-up.exe 29 PID 2284 wrote to memory of 2576 2284 Set-up.exe 29 PID 2284 wrote to memory of 2576 2284 Set-up.exe 29 PID 2284 wrote to memory of 2576 2284 Set-up.exe 29 PID 2576 wrote to memory of 2732 2576 more.com 31 PID 2576 wrote to memory of 2732 2576 more.com 31 PID 2576 wrote to memory of 2732 2576 more.com 31 PID 2576 wrote to memory of 2732 2576 more.com 31 PID 2576 wrote to memory of 2732 2576 more.com 31 PID 2576 wrote to memory of 2732 2576 more.com 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mal2\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\Mal2\Set-up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5fc8948e3fc902e7af4fa0083ac7a8bc1
SHA1be83e1c75a2c6c78d2f26e39f04fed4b17295753
SHA256e3a154f04decca96717e8b7224c77dad4f960027e63d2b71564a2e58b060bf9a
SHA512ef028166e126b8048270fc1cda7aa9d6a99043a2c801678cc7ca3ca66b8efe1deba80ea2f3f833c1e00fe60d5b281a00702d7780a59ff5337e3c8559b5955527