Resubmissions

22-04-2024 22:02

240422-1xtwbagh68 10

22-04-2024 19:25

240422-x42b7afa68 10

19-04-2024 03:02

240419-djmthsfh8w 10

Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2024 22:02

General

  • Target

    11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432.exe

  • Size

    14.4MB

  • MD5

    ecaa6f88c3b6594914a8ffde04fd5d84

  • SHA1

    885e4370299d369f7285ba5f2c544cbcd70a5fd0

  • SHA256

    11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432

  • SHA512

    94712c9ceddc1e2abd7ec19dc39bf2cbea54d3430f66887e2e0861c2cdb4c4ee24c39d3140c9374e826049516b814c3fcfcf4c49402bc5c2335d87bc0ee67f83

  • SSDEEP

    393216:hp8QGQCKH9iqYCfy8tW5MrYR0aioa4CMRmrrCZRBkyQzy:v8QGrK5GXR9ioaJMRmrrdysy

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://interferencesandyshiw.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

https://enthusiasimtitleow.shop/api

https://dismissalcylinderhostw.shop/api

https://affordcharmcropwo.shop/api

https://diskretainvigorousiw.shop/api

https://communicationgenerwo.shop/api

https://pillowbrocccolipe.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432.exe
    "C:\Users\Admin\AppData\Local\Temp\11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Users\Admin\AppData\Local\Temp\GUBootService.exe
      "C:\Users\Admin\AppData\Local\Temp\GUBootService.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Windows\SysWOW64\more.com
        C:\Windows\SysWOW64\more.com
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Users\Admin\AppData\Local\Temp\Fahu.au3
          C:\Users\Admin\AppData\Local\Temp\Fahu.au3
          4⤵
          • Loads dropped DLL
          PID:1404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Fahu.au3

    Filesize

    925KB

    MD5

    0162a97ed477353bc35776a7addffd5c

    SHA1

    10db8fe20bbce0f10517c510ec73532cf6feb227

    SHA256

    15600ccdef5a64b40d206d89234a51be1e11bd878dcefc5986590bcf40d9d571

    SHA512

    9638cab1aabe78c22a3d3528a391544f697d792640d831516b63fa52c393ee96bb588223e70163d059208cc5a14481c5ff7ef6ba9ac572322798a823d67f01f5

  • C:\Users\Admin\AppData\Local\Temp\GUBootService.exe

    Filesize

    11.5MB

    MD5

    4a053e8f03eba1dd6fcd28aeea8dc05f

    SHA1

    080d5f4b1c1e892658672aded073b70dfd14f7de

    SHA256

    6a5cc7a1803b002e91129d9317fa8f2d79fc07775ded7163c38d41569f8068ed

    SHA512

    32e3cc6fbb5db6b38c5aa18b3bb077c9e03e218d3698d6a30a6e62bfcba2692d4b625b286df0604637a5a7488d8215406c46f337f8ca908081b300a58945de3d

  • C:\Users\Admin\AppData\Local\Temp\b9ba3fe0

    Filesize

    2.0MB

    MD5

    d2235aeb97c1be6fbdd13517579bcbf9

    SHA1

    335abcda67ceab10c96bf4855642e031d65aa282

    SHA256

    fa699bcb14ae008a91105ab5ba25744e1f16420b95c628ce21329b285cee511a

    SHA512

    e4fcedf30de47a134d77ebd245c1e4036c8cdffdea84a44dad982e5c62346fc8ff304266e8b62d190159c5c6619d1bf5dc1ff8d70e73f78d56015d6f661c2041

  • C:\Users\Admin\AppData\Local\Temp\be076a57

    Filesize

    1.8MB

    MD5

    61763d0c9ce9ba5dd078bbd6b6227f68

    SHA1

    1becf202bfd942b65ce6444ba3119792e03a13a7

    SHA256

    141c5cee36a4eb8fc32940e33d3c3330a0ba8cf4a156ba56cb90ca9fb9028b88

    SHA512

    c500f64c7b5709ed025fb603294279fde11f722dc196a1386c77b3e1e6fa9cc24373275718233f4fc1b324921b445d5caa5bc73dfab3b477e889272aa23cace5

  • memory/1404-133-0x0000000000760000-0x00000000007AD000-memory.dmp

    Filesize

    308KB

  • memory/1404-132-0x0000000000870000-0x000000000095B000-memory.dmp

    Filesize

    940KB

  • memory/1404-128-0x0000000000760000-0x00000000007AD000-memory.dmp

    Filesize

    308KB

  • memory/1404-127-0x00007FF95BD70000-0x00007FF95BF65000-memory.dmp

    Filesize

    2.0MB

  • memory/2084-125-0x0000000073BC0000-0x0000000073D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/2084-119-0x00007FF95BD70000-0x00007FF95BF65000-memory.dmp

    Filesize

    2.0MB

  • memory/2084-121-0x0000000073BC0000-0x0000000073D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/2084-122-0x0000000073BC0000-0x0000000073D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/2084-117-0x0000000073BC0000-0x0000000073D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/3120-115-0x0000000073BC0000-0x0000000073D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/3120-114-0x0000000073BC0000-0x0000000073D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/3120-113-0x00007FF95BD70000-0x00007FF95BF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3120-112-0x0000000073BC0000-0x0000000073D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/3120-106-0x0000000000400000-0x000000000081A000-memory.dmp

    Filesize

    4.1MB