Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 00:10

General

  • Target

    8f84294e312b67061e2b2396a14205715ce3d9865606acf603d3afc11a698424.exe

  • Size

    343KB

  • MD5

    273bf8cb6e071f9e3eabd45fd0a63971

  • SHA1

    e28dc271d2b4e8a1bcdd39c9c17fc36931586ae2

  • SHA256

    8f84294e312b67061e2b2396a14205715ce3d9865606acf603d3afc11a698424

  • SHA512

    6735a0c74a79f9b3fe4c55a7c04b3e2cb545bad016f011766cd5e3dba6e079e6ee83a0203bbff356e0689c1804e34df24a4c2a629110b21dde04d98ea4e786b6

  • SSDEEP

    6144:U3qlnUGJTc/jaAEz0jcqp7WbCYAmupls78EAn:U3qlUGx0jaAEzqcqp7WbJ03EA

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://strollheavengwu.shop/api

https://productivelookewr.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f84294e312b67061e2b2396a14205715ce3d9865606acf603d3afc11a698424.exe
    "C:\Users\Admin\AppData\Local\Temp\8f84294e312b67061e2b2396a14205715ce3d9865606acf603d3afc11a698424.exe"
    1⤵
      PID:756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 1128
        2⤵
        • Program crash
        PID:1048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 756 -ip 756
      1⤵
        PID:636

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/756-1-0x0000000002DD0000-0x0000000002ED0000-memory.dmp

              Filesize

              1024KB

            • memory/756-2-0x00000000030D0000-0x000000000311B000-memory.dmp

              Filesize

              300KB

            • memory/756-3-0x0000000000400000-0x0000000002C39000-memory.dmp

              Filesize

              40.2MB

            • memory/756-4-0x0000000000400000-0x0000000002C39000-memory.dmp

              Filesize

              40.2MB

            • memory/756-5-0x00000000030D0000-0x000000000311B000-memory.dmp

              Filesize

              300KB