Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 01:01

General

  • Target

    0a27ad541882215cd383bc1702b6c2e5.exe

  • Size

    305KB

  • MD5

    0a27ad541882215cd383bc1702b6c2e5

  • SHA1

    b4b489f3f0496590a86f74f8f371e7e308649e3e

  • SHA256

    d19c3ec87d938380c5d1fff9c45357813a42b73499b1342f3b6d5297cf6c53fd

  • SHA512

    cf6affd9270a22ba971bfa6cc8f0dd7a8461a6dedbb1174e38d0bd1ab358fa038491e8b239f30065e5a20c1511c3f2e5f67c1968114f00169bbcf544e5f84d64

  • SSDEEP

    6144:iBAZ4kXDWC5JrHnaH7999ue/zCuMU6Jw0uDFG2O2scn3L8KM:i+vTXJrHngEe/evKG2BL

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://technologyenterdo.shop/api

https://detectordiscusser.shop/api

https://turkeyunlikelyofw.shop/api

https://associationokeo.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a27ad541882215cd383bc1702b6c2e5.exe
    "C:\Users\Admin\AppData\Local\Temp\0a27ad541882215cd383bc1702b6c2e5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4020

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2968-0-0x0000000000E90000-0x0000000000EE2000-memory.dmp

      Filesize

      328KB

    • memory/2968-1-0x0000000074990000-0x0000000075140000-memory.dmp

      Filesize

      7.7MB

    • memory/2968-9-0x0000000074990000-0x0000000075140000-memory.dmp

      Filesize

      7.7MB

    • memory/2968-10-0x00000000032E0000-0x00000000052E0000-memory.dmp

      Filesize

      32.0MB

    • memory/2968-13-0x00000000032E0000-0x00000000052E0000-memory.dmp

      Filesize

      32.0MB

    • memory/4020-4-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/4020-8-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/4020-12-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/4020-11-0x0000000000990000-0x0000000000991000-memory.dmp

      Filesize

      4KB