Resubmissions

17-04-2024 07:33

240417-jdvvtsae31 10

17-04-2024 06:33

240417-ha7jsahe7s 10

Analysis

  • max time kernel
    146s
  • max time network
    313s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 06:33

General

  • Target

    Setup.exe

  • Size

    2.3MB

  • MD5

    5d52ef45b6e5bf144307a84c2af1581b

  • SHA1

    414a899ec327d4a9daa53983544245b209f25142

  • SHA256

    26a24d3b0206c6808615c7049859c2fe62c4dcd87e7858be40ae8112b0482616

  • SHA512

    458f47c1e4ccf41edaacc57abb663ee77ca098fffc596fad941bbdea67653aeabc79b34d607078b9ee5adb45614e26f5c28a09e8faf9532081fdd5dec9ac3c48

  • SSDEEP

    49152:DzO+g39FbI0eQf/Z3CarWedoYAmXviDTMtT2wkqN5K:DzO19Fnf/hdoYAm9ZkqN5K

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://explocommisiowsa.shop/api

https://entitlementappwo.shop/api

https://economicscreateojsu.shop/api

https://pushjellysingeywus.shop/api

https://absentconvicsjawun.shop/api

https://suitcaseacanehalk.shop/api

https://bordersoarmanusjuw.shop/api

https://mealplayerpreceodsju.shop/api

https://wifeplasterbakewis.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\SysWOW64\netsh.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
          PID:3664

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1cec1660

      Filesize

      1016KB

      MD5

      8380ecf7038cbac429d78df52e863138

      SHA1

      dfd48deaf33608edc3d8f18a899d66bc9fb3278f

      SHA256

      3c12116de770c67a6b697d4a70331cab5939d373c37345fadf603f7560add032

      SHA512

      b8517cffd8b1213d26cab42f39dbb7b6cadf3306022975e70a82725c6b812c6d4f5d57aefb004e8a0af83f1447f165d930d3b798687993df1568b83c86e58fab

    • memory/1152-19-0x0000000057800000-0x0000000057812000-memory.dmp

      Filesize

      72KB

    • memory/1152-21-0x0000000050310000-0x0000000050349000-memory.dmp

      Filesize

      228KB

    • memory/1152-11-0x0000000073F80000-0x00000000740FB000-memory.dmp

      Filesize

      1.5MB

    • memory/1152-18-0x0000000057000000-0x000000005703F000-memory.dmp

      Filesize

      252KB

    • memory/1152-1-0x00007FF919670000-0x00007FF919865000-memory.dmp

      Filesize

      2.0MB

    • memory/1152-14-0x0000000000400000-0x0000000000698000-memory.dmp

      Filesize

      2.6MB

    • memory/1152-16-0x0000000050000000-0x0000000050116000-memory.dmp

      Filesize

      1.1MB

    • memory/1152-20-0x0000000050120000-0x000000005030D000-memory.dmp

      Filesize

      1.9MB

    • memory/1152-0-0x0000000073F80000-0x00000000740FB000-memory.dmp

      Filesize

      1.5MB

    • memory/1152-10-0x0000000073F80000-0x00000000740FB000-memory.dmp

      Filesize

      1.5MB

    • memory/1152-17-0x0000000059800000-0x000000005986E000-memory.dmp

      Filesize

      440KB

    • memory/2068-23-0x0000000073F80000-0x00000000740FB000-memory.dmp

      Filesize

      1.5MB

    • memory/2068-22-0x00007FF919670000-0x00007FF919865000-memory.dmp

      Filesize

      2.0MB

    • memory/2068-24-0x0000000073F80000-0x00000000740FB000-memory.dmp

      Filesize

      1.5MB

    • memory/2068-26-0x0000000073F80000-0x00000000740FB000-memory.dmp

      Filesize

      1.5MB

    • memory/2068-13-0x0000000073F80000-0x00000000740FB000-memory.dmp

      Filesize

      1.5MB

    • memory/3664-28-0x0000000000180000-0x00000000001D1000-memory.dmp

      Filesize

      324KB

    • memory/3664-27-0x00007FF919670000-0x00007FF919865000-memory.dmp

      Filesize

      2.0MB

    • memory/3664-32-0x0000000000180000-0x00000000001D1000-memory.dmp

      Filesize

      324KB

    • memory/3664-31-0x0000000000200000-0x0000000000633000-memory.dmp

      Filesize

      4.2MB