Analysis
-
max time kernel
126s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2023 09:39
Static task
static1
Behavioral task
behavioral1
Sample
c16ba0f2004c45a448d524867b6dfac5.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
c16ba0f2004c45a448d524867b6dfac5.exe
-
Size
276KB
-
MD5
c16ba0f2004c45a448d524867b6dfac5
-
SHA1
4511810aaa7ce1542ee94adf00e4f510025a189d
-
SHA256
6b8838ea9bff0a51596fe3c2b77b3b0a5402c23cc87692d3648d8f4a28ce705d
-
SHA512
460237872e9bcf0e70f3d719b7321171f6969bbb3dac1d1d744b8be590a59f9fcba3cb1331e7c19448f4c4f45a340dd704209154e87f20fcdc80d0b8489a50cc
-
SSDEEP
6144:qHZfDLuw3OQibtDGS6q8QsVBLNLTE7y0+FtsSsU4zqQna:qHZ7CweQAhz8RVpNLTE+0mtkFP
Malware Config
Extracted
Family
lumma
C2
77.73.134.68
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3728 1420 WerFault.exe c16ba0f2004c45a448d524867b6dfac5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c16ba0f2004c45a448d524867b6dfac5.exe"C:\Users\Admin\AppData\Local\Temp\c16ba0f2004c45a448d524867b6dfac5.exe"1⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 13282⤵
- Program crash
PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1420 -ip 14201⤵PID:1804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1420-132-0x000000000051E000-0x0000000000538000-memory.dmpFilesize
104KB
-
memory/1420-133-0x0000000002190000-0x00000000021BA000-memory.dmpFilesize
168KB
-
memory/1420-134-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/1420-135-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB