Analysis

  • max time kernel
    20s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2023 07:39

General

  • Target

    Stealer/C4A17DBA.exe

  • Size

    755KB

  • MD5

    b0517305850d5be8e02a648bb90a3c6d

  • SHA1

    24e75c0ea6b07fd3c4e03c6661ed911632f3e784

  • SHA256

    5c180cd34694c91bc7f4ecaf67d4f462f10254d190d181e02a2a2a7e03d44204

  • SHA512

    17207aec32a872ad024fb2c67e272830454ca69b095c8b43a1db46c842c6e8530b10a3cc9f1c4d596757949d8a2c448bae44d058f614f037cbf93cb036ca26af

  • SSDEEP

    12288:IsjWYqfNTYmessZerchdW7lRA3aDloJZsjudEDT26qh+kB:IsjWYGYnZQchI83mlamGv6a

Score
10/10

Malware Config

Extracted

Family

lumma

C2

gstatic-node.io

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Stealer\C4A17DBA.exe
    "C:\Users\Admin\AppData\Local\Temp\Stealer\C4A17DBA.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      #cmd
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1724-301-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1724-305-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1724-304-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2216-88-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-122-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-59-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-60-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-62-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-64-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-90-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-68-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-70-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-72-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-74-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-76-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-78-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-80-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-82-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-84-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-86-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-94-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-66-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-58-0x0000000000480000-0x00000000004B8000-memory.dmp

    Filesize

    224KB

  • memory/2216-54-0x0000000000AE0000-0x0000000000BA2000-memory.dmp

    Filesize

    776KB

  • memory/2216-96-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-98-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-100-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-102-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-104-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-106-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-110-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-108-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-112-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-114-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-116-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-118-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-120-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-92-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/2216-291-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2216-302-0x0000000074A50000-0x000000007513E000-memory.dmp

    Filesize

    6.9MB

  • memory/2216-57-0x0000000000210000-0x0000000000211000-memory.dmp

    Filesize

    4KB

  • memory/2216-56-0x0000000004C40000-0x0000000004C80000-memory.dmp

    Filesize

    256KB

  • memory/2216-55-0x0000000074A50000-0x000000007513E000-memory.dmp

    Filesize

    6.9MB