Analysis
-
max time kernel
38s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 17:22
Behavioral task
behavioral1
Sample
Extreme Injector.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Qt5Gui.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Qt5Network.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral4
Sample
Qt5Svg.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Qt5Widgets.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
msvcp140.dll
Resource
win10v2004-20250314-en
General
-
Target
Setup.exe
-
Size
2.1MB
-
MD5
b2a3644eac09f50b16aa4d3fcf207954
-
SHA1
f8297b820360c12f91464c8ddd44fd18bc83b45f
-
SHA256
8f5b8f495c30b9c036219413370daf76fdfd73e065f329d05a5c5bfea4bf47ca
-
SHA512
e4f24b36a5a77c005e3e8a3ee686462afe8016004c06b5ae1cdb9c4b305dfccf2450691e60649abb704e6bc815c5478e72a84fbc7e1dbff06a137cdb4ef54e7e
-
SSDEEP
24576:ENI2LXlFLf2uee/0kd+mELBX11GyDXcOSbHYROlWJrsUrEMFksh9W8:unFFytuaRFIUEMe+J
Malware Config
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://ttargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3348 set thread context of 4464 3348 Setup.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4464 MSBuild.exe 4464 MSBuild.exe 4464 MSBuild.exe 4464 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3348 wrote to memory of 4464 3348 Setup.exe 87 PID 3348 wrote to memory of 4464 3348 Setup.exe 87 PID 3348 wrote to memory of 4464 3348 Setup.exe 87 PID 3348 wrote to memory of 4464 3348 Setup.exe 87 PID 3348 wrote to memory of 4464 3348 Setup.exe 87 PID 3348 wrote to memory of 4464 3348 Setup.exe 87 PID 3348 wrote to memory of 4464 3348 Setup.exe 87 PID 3348 wrote to memory of 4464 3348 Setup.exe 87 PID 3348 wrote to memory of 4464 3348 Setup.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4464
-