Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 14:23

General

  • Target

    c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475.exe

  • Size

    518KB

  • MD5

    c4ffab152141150528716daa608d5b92

  • SHA1

    a48d3aecc0e986b6c4369b9d4cfffb08b53aed89

  • SHA256

    c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475

  • SHA512

    a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9

  • SSDEEP

    12288:U/MDmKNcPcu1DY2Qdp4N7EPlXWc/LN8BRpxOv9q8:3mJadAEdXWELNaDxOE

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://roomabolishsnifftwk.shop/api

https://museumtespaceorsp.shop/api

https://buttockdecarderwiso.shop/api

https://averageaattractiionsl.shop/api

https://femininiespywageg.shop/api

https://employhabragaomlsp.shop/api

https://stalfbaclcalorieeis.shop/api

https://civilianurinedtsraov.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475.exe
    "C:\Users\Admin\AppData\Local\Temp\c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4332

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/60-0-0x00000000005E0000-0x00000000005E1000-memory.dmp

      Filesize

      4KB

    • memory/60-2-0x00000000005E0000-0x00000000005E1000-memory.dmp

      Filesize

      4KB

    • memory/4332-1-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/4332-5-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/4332-4-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/4332-6-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB