Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 17:22
Behavioral task
behavioral1
Sample
Extreme Injector.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Qt5Gui.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Qt5Network.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral4
Sample
Qt5Svg.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Qt5Widgets.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
msvcp140.dll
Resource
win10v2004-20250314-en
General
-
Target
Extreme Injector.exe
-
Size
102.1MB
-
MD5
272f2d74795ab3d03804c71f00344613
-
SHA1
045bda7b78be00270f0546e78ffa60c7cbdecdea
-
SHA256
4b84e27463c1ceba86667b6f835a54ce16fa722cd4dcf151a15ee0b89fc3bacf
-
SHA512
ba0d183aeb27e584d1b22f6af86d89160a438e634f72f4adf8e2a138ba646567b521d14f587d7f0d3892247bd06f66a2d221163d8cf9f361838c191d1a1146a4
-
SSDEEP
24576:4NI2LXlFLf2uee/0kd+mELBX11GyDXcOSbXsRkj/o7elGcQzWAlQ:6nFFytuFsW/1AcQSAG
Malware Config
Extracted
lumma
https://castlaby.live/naogd
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://-starcloc.bet/GOksAo
https://ladvennture.top/GKsiio
https://targett.top/dsANGt
https://nspacedbv.world/EKdlsk
https://4galxnetb.today/GsuIAo
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4664 set thread context of 4008 4664 Extreme Injector.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4008 MSBuild.exe 4008 MSBuild.exe 4008 MSBuild.exe 4008 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4008 4664 Extreme Injector.exe 90 PID 4664 wrote to memory of 4008 4664 Extreme Injector.exe 90 PID 4664 wrote to memory of 4008 4664 Extreme Injector.exe 90 PID 4664 wrote to memory of 4008 4664 Extreme Injector.exe 90 PID 4664 wrote to memory of 4008 4664 Extreme Injector.exe 90 PID 4664 wrote to memory of 4008 4664 Extreme Injector.exe 90 PID 4664 wrote to memory of 4008 4664 Extreme Injector.exe 90 PID 4664 wrote to memory of 4008 4664 Extreme Injector.exe 90 PID 4664 wrote to memory of 4008 4664 Extreme Injector.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe"C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4008
-