Analysis

  • max time kernel
    216s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20231220-en
  • resource tags

    arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-02-2024 03:42

General

  • Target

    eaab9f6775fbec120229d909a457058334c79609fd8c92bb99a2b186b34ed5df.exe

  • Size

    948KB

  • MD5

    17b10059937dfd719ed14ccf111d0879

  • SHA1

    b71db6b40d8b7749c979fd20a98c45489b5631bd

  • SHA256

    eaab9f6775fbec120229d909a457058334c79609fd8c92bb99a2b186b34ed5df

  • SHA512

    faae0e883550c9bded3bb13660f1a92ea7038ca75a431d90e503db9d5f2d97a5b04e02567739aad01e4457b3ac177e389667a510783d3e3455a548b98853fa80

  • SSDEEP

    24576:qefzd7gtkhb7vogFlQ3BoBgccILHq+bi43B5cYErxIm:qqzd75ggGugcBKmDmrxIm

Score
10/10

Malware Config

Extracted

Family

lumma

C2

http://freckletropsao.pw/api

Signatures

  • Detect Lumma Stealer payload V4 5 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaab9f6775fbec120229d909a457058334c79609fd8c92bb99a2b186b34ed5df.exe
    "C:\Users\Admin\AppData\Local\Temp\eaab9f6775fbec120229d909a457058334c79609fd8c92bb99a2b186b34ed5df.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\eaab9f6775fbec120229d909a457058334c79609fd8c92bb99a2b186b34ed5df.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4544
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wabzaZXb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD84F.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3456
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wabzaZXb.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2024
    • C:\Users\Admin\AppData\Local\Temp\eaab9f6775fbec120229d909a457058334c79609fd8c92bb99a2b186b34ed5df.exe
      "C:\Users\Admin\AppData\Local\Temp\eaab9f6775fbec120229d909a457058334c79609fd8c92bb99a2b186b34ed5df.exe"
      2⤵
        PID:3596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      1c19c16e21c97ed42d5beabc93391fc5

      SHA1

      8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

      SHA256

      1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

      SHA512

      7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      5480e465e52a6d172ca77edb0976a633

      SHA1

      d0ecffdfacb3e2c61d9744dc0da82b68a1b4235e

      SHA256

      921273a1dd3ce2cd0832d8fa38c69c9df7915bdfe2cecdbf64dee24f185acaaa

      SHA512

      56d53a975580797194b351040872a690a83646b020b12e8d415ef5d3b6c2acc012c19622fb09408d9ee9be145ea1c721f415140692928029039565edda7fea3b

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hkfxwj0l.qe1.ps1

      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • C:\Users\Admin\AppData\Local\Temp\tmpD84F.tmp

      Filesize

      1KB

      MD5

      6d32caf9ccf47711bee934f92b6f2ddf

      SHA1

      b141bd66c071142fdd3b18bc1846647d45754b26

      SHA256

      cab783fcadcd46c00480fd3933551d478de7e06c78784e78b7ec776ec4dd6ab2

      SHA512

      660289e26469472017780e76ad5304902b7c2ef42bca3a8e94d70677262d7046ce8e6696ff18e28898a06b804b8121b604df9347f442217a94439543e626f904

    • memory/316-8-0x0000000005FD0000-0x0000000005FDA000-memory.dmp

      Filesize

      40KB

    • memory/316-11-0x0000000073DF0000-0x00000000744DE000-memory.dmp

      Filesize

      6.9MB

    • memory/316-6-0x0000000005760000-0x0000000005778000-memory.dmp

      Filesize

      96KB

    • memory/316-7-0x00000000057D0000-0x00000000057D6000-memory.dmp

      Filesize

      24KB

    • memory/316-5-0x00000000054D0000-0x00000000054DA000-memory.dmp

      Filesize

      40KB

    • memory/316-10-0x000000000F9E0000-0x000000000FA7C000-memory.dmp

      Filesize

      624KB

    • memory/316-9-0x000000000C320000-0x000000000C3DA000-memory.dmp

      Filesize

      744KB

    • memory/316-0-0x0000000000A40000-0x0000000000B32000-memory.dmp

      Filesize

      968KB

    • memory/316-12-0x00000000054C0000-0x00000000054D0000-memory.dmp

      Filesize

      64KB

    • memory/316-39-0x0000000073DF0000-0x00000000744DE000-memory.dmp

      Filesize

      6.9MB

    • memory/316-4-0x00000000054C0000-0x00000000054D0000-memory.dmp

      Filesize

      64KB

    • memory/316-3-0x0000000005500000-0x0000000005592000-memory.dmp

      Filesize

      584KB

    • memory/316-2-0x0000000005A00000-0x0000000005EFE000-memory.dmp

      Filesize

      5.0MB

    • memory/316-1-0x0000000073DF0000-0x00000000744DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2024-26-0x00000000073F0000-0x0000000007400000-memory.dmp

      Filesize

      64KB

    • memory/2024-28-0x00000000073F0000-0x0000000007400000-memory.dmp

      Filesize

      64KB

    • memory/2024-92-0x0000000009C60000-0x0000000009CF4000-memory.dmp

      Filesize

      592KB

    • memory/2024-29-0x00000000077B0000-0x00000000077D2000-memory.dmp

      Filesize

      136KB

    • memory/2024-31-0x0000000008060000-0x00000000080C6000-memory.dmp

      Filesize

      408KB

    • memory/2024-478-0x0000000007420000-0x000000000743A000-memory.dmp

      Filesize

      104KB

    • memory/2024-91-0x00000000073F0000-0x0000000007400000-memory.dmp

      Filesize

      64KB

    • memory/2024-25-0x0000000073DF0000-0x00000000744DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2024-33-0x00000000081F0000-0x0000000008540000-memory.dmp

      Filesize

      3.3MB

    • memory/2024-89-0x0000000009990000-0x0000000009A35000-memory.dmp

      Filesize

      660KB

    • memory/2024-76-0x0000000072900000-0x000000007294B000-memory.dmp

      Filesize

      300KB

    • memory/2024-80-0x000000007E4D0000-0x000000007E4E0000-memory.dmp

      Filesize

      64KB

    • memory/2024-519-0x0000000073DF0000-0x00000000744DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2024-78-0x0000000009930000-0x000000000994E000-memory.dmp

      Filesize

      120KB

    • memory/3596-34-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/3596-143-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/3596-35-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/3596-36-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/3596-38-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/4544-79-0x0000000072900000-0x000000007294B000-memory.dmp

      Filesize

      300KB

    • memory/4544-77-0x000000007E710000-0x000000007E720000-memory.dmp

      Filesize

      64KB

    • memory/4544-40-0x00000000075F0000-0x000000000760C000-memory.dmp

      Filesize

      112KB

    • memory/4544-75-0x0000000008F80000-0x0000000008FB3000-memory.dmp

      Filesize

      204KB

    • memory/4544-41-0x0000000008060000-0x00000000080AB000-memory.dmp

      Filesize

      300KB

    • memory/4544-32-0x0000000007780000-0x00000000077E6000-memory.dmp

      Filesize

      408KB

    • memory/4544-90-0x00000000009C0000-0x00000000009D0000-memory.dmp

      Filesize

      64KB

    • memory/4544-27-0x00000000009C0000-0x00000000009D0000-memory.dmp

      Filesize

      64KB

    • memory/4544-42-0x0000000007E50000-0x0000000007EC6000-memory.dmp

      Filesize

      472KB

    • memory/4544-21-0x00000000009C0000-0x00000000009D0000-memory.dmp

      Filesize

      64KB

    • memory/4544-487-0x0000000006A00000-0x0000000006A08000-memory.dmp

      Filesize

      32KB

    • memory/4544-23-0x0000000006D40000-0x0000000007368000-memory.dmp

      Filesize

      6.2MB

    • memory/4544-20-0x00000000066D0000-0x0000000006706000-memory.dmp

      Filesize

      216KB

    • memory/4544-517-0x0000000073DF0000-0x00000000744DE000-memory.dmp

      Filesize

      6.9MB

    • memory/4544-19-0x0000000073DF0000-0x00000000744DE000-memory.dmp

      Filesize

      6.9MB