Analysis

  • max time kernel
    139s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 15:15

General

  • Target

    c7e125a86e999a9e90cdf51a90688017a176d8e8b9275afbccb7563250fce408.exe

  • Size

    399KB

  • MD5

    aaf652b8eb2366e341e1ca3f5cbb5fef

  • SHA1

    50d990ebb2496fa098f35067cbbab2566d1649ef

  • SHA256

    c7e125a86e999a9e90cdf51a90688017a176d8e8b9275afbccb7563250fce408

  • SHA512

    aa05ded281d76cc6e73b93e9b122cf1310a24de0f5d3fd4e4434b48be5416fd21b7cf3012c4ea739f9bb73af6e02f78a8ea7804b34436d41137a67bcb44d86e4

  • SSDEEP

    6144:6StkzmwS+ALSG019hQK/aCcFfpQ4Nty09vepRpN:NuzmmSSphtCfpQCpgRp

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://strollheavengwu.shop/api

https://productivelookewr.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Program crash 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7e125a86e999a9e90cdf51a90688017a176d8e8b9275afbccb7563250fce408.exe
    "C:\Users\Admin\AppData\Local\Temp\c7e125a86e999a9e90cdf51a90688017a176d8e8b9275afbccb7563250fce408.exe"
    1⤵
      PID:4208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 676
        2⤵
        • Program crash
        PID:3108
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 1160
        2⤵
        • Program crash
        PID:1684
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 1080
        2⤵
        • Program crash
        PID:1012
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4208 -ip 4208
      1⤵
        PID:1852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4208 -ip 4208
        1⤵
          PID:2744
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4208 -ip 4208
          1⤵
            PID:2608

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4208-1-0x0000000001B60000-0x0000000001C60000-memory.dmp

            Filesize

            1024KB

          • memory/4208-2-0x0000000001AB0000-0x0000000001AFE000-memory.dmp

            Filesize

            312KB

          • memory/4208-3-0x0000000000400000-0x0000000001A2E000-memory.dmp

            Filesize

            22.2MB

          • memory/4208-4-0x0000000000400000-0x0000000001A2E000-memory.dmp

            Filesize

            22.2MB

          • memory/4208-6-0x0000000001AB0000-0x0000000001AFE000-memory.dmp

            Filesize

            312KB