Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 15:21

General

  • Target

    613e8de3b5eba303bd2dc0b5d2f2f3df3586c0f63c31eb1f2c60f4e30e70dda6.exe

  • Size

    1.2MB

  • MD5

    78cdac30810324709d9ded08c4501f8d

  • SHA1

    083f16342f0ef90d57321b873ad972a16b168f86

  • SHA256

    613e8de3b5eba303bd2dc0b5d2f2f3df3586c0f63c31eb1f2c60f4e30e70dda6

  • SHA512

    8b5e989df009891bf8178718e4fe9bf38e4f421c6295d1ebcc30eaa7762958a9009f7cfeadd18d508f7483e6fe043dad9a7181b6dc3b511fc205d35ae1e31890

  • SSDEEP

    24576:VnBoveElInZKRPgiGilvvTd1YYWTsywSs6E:VBeInZKRPgiGiNYdTVm

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://productivelookewr.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://incredibleextedwj.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\613e8de3b5eba303bd2dc0b5d2f2f3df3586c0f63c31eb1f2c60f4e30e70dda6.exe
    "C:\Users\Admin\AppData\Local\Temp\613e8de3b5eba303bd2dc0b5d2f2f3df3586c0f63c31eb1f2c60f4e30e70dda6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 320
        2⤵
        • Program crash
        PID:2344
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4856 -ip 4856
      1⤵
        PID:208

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2972-1-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2972-3-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2972-4-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/4856-0-0x0000000000146000-0x0000000000147000-memory.dmp

              Filesize

              4KB