Analysis

  • max time kernel
    1743s
  • max time network
    1175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 10:17

General

  • Target

    Setup.exe

  • Size

    489KB

  • MD5

    5174e994652d09ba7396233c95d59619

  • SHA1

    5a141acabda964b50bcf574a10c773a6b47700b7

  • SHA256

    b022e84bd788984165f784f32a92ed179bedba490d5f13a1a0ca5efabb847cfe

  • SHA512

    57ac8e211c782ecc47b5058d37fd4ed9b8bb61c1d86a5850474ce3105d5d1fd8b16b458f31a4b4600302aa65faa8fb9f3442dbc45bdc38e0a0a7b53b298d1a36

  • SSDEEP

    12288:d4J4ZH65jJj3y/vZNCbkRgaUCR6THZHiO4EoEhkXRa:y4ZGji/v3CIRgaUNETB

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://productivelookewr.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3740
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2416

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2416-0-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/2416-3-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/2416-4-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/2416-5-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/3740-1-0x0000000000A80000-0x0000000000AFF000-memory.dmp

            Filesize

            508KB