Analysis

  • max time kernel
    131s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2024 16:16

General

  • Target

    c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475.exe

  • Size

    518KB

  • MD5

    c4ffab152141150528716daa608d5b92

  • SHA1

    a48d3aecc0e986b6c4369b9d4cfffb08b53aed89

  • SHA256

    c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475

  • SHA512

    a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9

  • SSDEEP

    12288:U/MDmKNcPcu1DY2Qdp4N7EPlXWc/LN8BRpxOv9q8:3mJadAEdXWELNaDxOE

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://roomabolishsnifftwk.shop/api

https://museumtespaceorsp.shop/api

https://buttockdecarderwiso.shop/api

https://averageaattractiionsl.shop/api

https://femininiespywageg.shop/api

https://employhabragaomlsp.shop/api

https://stalfbaclcalorieeis.shop/api

https://civilianurinedtsraov.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475.exe
    "C:\Users\Admin\AppData\Local\Temp\c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2964

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2964-2-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/2964-5-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/2964-6-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/2964-7-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/4736-0-0x00000000008A0000-0x00000000008A1000-memory.dmp

      Filesize

      4KB

    • memory/4736-1-0x00000000008A0000-0x00000000008A1000-memory.dmp

      Filesize

      4KB

    • memory/4736-3-0x00000000008A0000-0x00000000008A1000-memory.dmp

      Filesize

      4KB