Analysis Overview
SHA256
addf8ec54b04eef9da41561b99f66261e7ea8bd53890c9f08dff41f423732e6f
Threat Level: Known bad
The file addf8ec54b04eef9da41561b99f66261e7ea8bd53890c9f08dff41f423732e6f was found to be: Known bad.
Malicious Activity Summary
Lumma Stealer
Program crash
Unsigned PE
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-04-25 15:31
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-25 15:31
Reported
2024-04-25 15:34
Platform
win11-20240412-en
Max time kernel
90s
Max time network
95s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\addf8ec54b04eef9da41561b99f66261e7ea8bd53890c9f08dff41f423732e6f.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\addf8ec54b04eef9da41561b99f66261e7ea8bd53890c9f08dff41f423732e6f.exe
"C:\Users\Admin\AppData\Local\Temp\addf8ec54b04eef9da41561b99f66261e7ea8bd53890c9f08dff41f423732e6f.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4836 -ip 4836
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1252
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | strollheavengwu.shop | udp |
| US | 172.67.163.209:443 | strollheavengwu.shop | tcp |
| US | 8.8.8.8:53 | productivelookewr.shop | udp |
| US | 8.8.8.8:53 | 209.163.67.172.in-addr.arpa | udp |
| US | 104.21.11.250:443 | productivelookewr.shop | tcp |
| US | 104.21.89.202:443 | tolerateilusidjukl.shop | tcp |
| US | 172.67.169.43:443 | shatterbreathepsw.shop | tcp |
| US | 8.8.8.8:53 | 202.89.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.169.67.172.in-addr.arpa | udp |
| US | 172.67.216.69:443 | shortsvelventysjo.shop | tcp |
| US | 104.21.86.106:443 | incredibleextedwj.shop | tcp |
| US | 172.67.157.23:443 | alcojoldwograpciw.shop | tcp |
| US | 172.67.192.138:443 | liabilitynighstjsko.shop | tcp |
| US | 172.67.147.169:443 | demonstationfukewko.shop | tcp |
| US | 8.8.8.8:53 | 23.157.67.172.in-addr.arpa | udp |
Files
memory/4836-1-0x0000000002CD0000-0x0000000002DD0000-memory.dmp
memory/4836-2-0x00000000031A0000-0x00000000031EB000-memory.dmp
memory/4836-3-0x0000000000400000-0x0000000002C3F000-memory.dmp
memory/4836-6-0x00000000031A0000-0x00000000031EB000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-25 15:31
Reported
2024-04-25 15:34
Platform
win10v2004-20240412-en
Max time kernel
148s
Max time network
128s
Command Line
Signatures
Lumma Stealer
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\addf8ec54b04eef9da41561b99f66261e7ea8bd53890c9f08dff41f423732e6f.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\addf8ec54b04eef9da41561b99f66261e7ea8bd53890c9f08dff41f423732e6f.exe
"C:\Users\Admin\AppData\Local\Temp\addf8ec54b04eef9da41561b99f66261e7ea8bd53890c9f08dff41f423732e6f.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4164 -ip 4164
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 1132
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | strollheavengwu.shop | udp |
| US | 104.21.15.198:443 | strollheavengwu.shop | tcp |
| US | 8.8.8.8:53 | productivelookewr.shop | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 198.15.21.104.in-addr.arpa | udp |
| US | 104.21.11.250:443 | productivelookewr.shop | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tolerateilusidjukl.shop | udp |
| US | 172.67.147.41:443 | tolerateilusidjukl.shop | tcp |
| US | 8.8.8.8:53 | 198.32.209.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 250.11.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | shatterbreathepsw.shop | udp |
| US | 8.8.8.8:53 | 21.114.53.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.147.67.172.in-addr.arpa | udp |
| US | 104.21.95.19:443 | shatterbreathepsw.shop | tcp |
| US | 8.8.8.8:53 | shortsvelventysjo.shop | udp |
| US | 8.8.8.8:53 | 19.95.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 172.67.216.69:443 | shortsvelventysjo.shop | tcp |
| US | 8.8.8.8:53 | incredibleextedwj.shop | udp |
| US | 104.21.86.106:443 | incredibleextedwj.shop | tcp |
| US | 8.8.8.8:53 | alcojoldwograpciw.shop | udp |
| US | 8.8.8.8:53 | 106.86.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.216.67.172.in-addr.arpa | udp |
| US | 172.67.157.23:443 | alcojoldwograpciw.shop | tcp |
| US | 8.8.8.8:53 | liabilitynighstjsko.shop | udp |
| US | 8.8.8.8:53 | 23.157.67.172.in-addr.arpa | udp |
| US | 172.67.192.138:443 | liabilitynighstjsko.shop | tcp |
| US | 8.8.8.8:53 | demonstationfukewko.shop | udp |
| US | 172.67.147.169:443 | demonstationfukewko.shop | tcp |
| US | 8.8.8.8:53 | 138.192.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 169.147.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.143.109.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.251.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
Files
memory/4164-1-0x0000000003030000-0x0000000003130000-memory.dmp
memory/4164-2-0x0000000002FB0000-0x0000000002FFB000-memory.dmp
memory/4164-3-0x0000000000400000-0x0000000002C3F000-memory.dmp
memory/4164-4-0x0000000000400000-0x0000000002C3F000-memory.dmp
memory/4164-6-0x0000000002FB0000-0x0000000002FFB000-memory.dmp