Analysis Overview
SHA256
513a7075ffc6246fc87514a530f423693a04e6428d1e2de9d054630e5e1863de
Threat Level: Known bad
The file 513a7075ffc6246fc87514a530f423693a04e6428d1e2de9d054630e5e1863de was found to be: Known bad.
Malicious Activity Summary
Lumma Stealer
Detect Lumma Stealer payload V4
Enumerates connected drives
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-02-22 01:33
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-02-22 01:33
Reported
2024-02-22 01:35
Platform
win7-20240221-en
Max time kernel
150s
Max time network
129s
Command Line
Signatures
Detect Lumma Stealer payload V4
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Lumma Stealer
Enumerates connected drives
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\513a7075ffc6246fc87514a530f423693a04e6428d1e2de9d054630e5e1863de.exe
"C:\Users\Admin\AppData\Local\Temp\513a7075ffc6246fc87514a530f423693a04e6428d1e2de9d054630e5e1863de.exe"
Network
Files
memory/1092-0-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1092-1-0x0000000075B40000-0x0000000075B87000-memory.dmp
memory/1092-811-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-812-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-814-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-816-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-818-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-820-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-822-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-824-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-826-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-828-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-830-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-832-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-834-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-836-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-838-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-840-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-842-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-844-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-846-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-848-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-850-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-852-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-854-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-856-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-858-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-860-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-862-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-864-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-866-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-868-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-870-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-872-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-2547-0x0000000001F90000-0x0000000002111000-memory.dmp
memory/1092-8686-0x0000000002120000-0x0000000002231000-memory.dmp
memory/1092-8693-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1092-8694-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1092-8695-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1092-8696-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1092-8697-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1092-8701-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1092-8702-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1092-8703-0x0000000010000000-0x000000001080D000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-02-22 01:33
Reported
2024-02-22 01:35
Platform
win10v2004-20240221-en
Max time kernel
151s
Max time network
158s
Command Line
Signatures
Detect Lumma Stealer payload V4
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Lumma Stealer
Enumerates connected drives
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\513a7075ffc6246fc87514a530f423693a04e6428d1e2de9d054630e5e1863de.exe
"C:\Users\Admin\AppData\Local\Temp\513a7075ffc6246fc87514a530f423693a04e6428d1e2de9d054630e5e1863de.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 12.173.189.20.in-addr.arpa | udp |
Files
memory/1400-0-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-1-0x0000000076600000-0x0000000076815000-memory.dmp
memory/1400-3875-0x0000000075EA0000-0x0000000076040000-memory.dmp
memory/1400-5884-0x00000000751F0000-0x000000007526A000-memory.dmp
memory/1400-13069-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13070-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13071-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13072-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13074-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13075-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13076-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13077-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13078-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13079-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13080-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13081-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13082-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13083-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13084-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13085-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13086-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13087-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13088-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13089-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13090-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13091-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13092-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13093-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13094-0x0000000010000000-0x000000001080D000-memory.dmp
memory/1400-13095-0x0000000010000000-0x000000001080D000-memory.dmp