Analysis Overview
SHA256
a042293778a18f71dc448b16c6b782490534789d43f59608678b3e89367b3a34
Threat Level: Known bad
The file !!SetUp_22334_Pa$sW0rd$$!.zip was found to be: Known bad.
Malicious Activity Summary
Lumma Stealer
Suspicious use of SetThreadContext
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-07-09 22:19
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-09 22:19
Reported
2024-07-09 22:22
Platform
win7-20240705-en
Max time kernel
121s
Max time network
123s
Command Line
Signatures
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2500 wrote to memory of 2052 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\system32\WerFault.exe |
| PID 2500 wrote to memory of 2052 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\system32\WerFault.exe |
| PID 2500 wrote to memory of 2052 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe
"C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe"
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2500 -s 92
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-09 22:19
Reported
2024-07-09 22:22
Platform
win10v2004-20240709-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Lumma Stealer
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2640 set thread context of 4812 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2640 wrote to memory of 4812 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 2640 wrote to memory of 4812 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 2640 wrote to memory of 4812 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 2640 wrote to memory of 4812 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 4812 wrote to memory of 1404 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
| PID 4812 wrote to memory of 1404 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
| PID 4812 wrote to memory of 1404 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
| PID 4812 wrote to memory of 1404 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe
"C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe"
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\SearchIndexer.exe
C:\Windows\SysWOW64\SearchIndexer.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | unwielldyzpwo.shop | udp |
| US | 172.67.158.68:443 | unwielldyzpwo.shop | tcp |
| US | 8.8.8.8:53 | bouncedgowp.shop | udp |
| US | 104.21.93.198:443 | bouncedgowp.shop | tcp |
| US | 8.8.8.8:53 | bannngwko.shop | udp |
| US | 8.8.8.8:53 | 68.158.67.172.in-addr.arpa | udp |
| US | 104.21.81.196:443 | bannngwko.shop | tcp |
| US | 8.8.8.8:53 | bargainnykwo.shop | udp |
| US | 172.67.146.97:443 | bargainnykwo.shop | tcp |
| US | 8.8.8.8:53 | affecthorsedpo.shop | udp |
| US | 172.67.135.137:443 | affecthorsedpo.shop | tcp |
| US | 8.8.8.8:53 | 198.93.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.81.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.146.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | radiationnopp.shop | udp |
| US | 104.21.68.158:443 | radiationnopp.shop | tcp |
| US | 8.8.8.8:53 | answerrsdo.shop | udp |
| US | 104.21.44.192:443 | answerrsdo.shop | tcp |
| US | 8.8.8.8:53 | 158.68.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.135.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | publicitttyps.shop | udp |
| US | 172.67.134.88:443 | publicitttyps.shop | tcp |
| US | 8.8.8.8:53 | benchillppwo.shop | udp |
| US | 172.67.160.230:443 | benchillppwo.shop | tcp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 8.8.8.8:53 | 88.134.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 192.44.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | reinforcedirectorywd.shop | udp |
| US | 172.67.214.98:443 | reinforcedirectorywd.shop | tcp |
| US | 8.8.8.8:53 | 155.143.214.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 230.160.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.214.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.179.89.13.in-addr.arpa | udp |
Files
memory/2640-0-0x00007FFFC89F0000-0x00007FFFC8E62000-memory.dmp
memory/2640-10-0x00007FFFC8A08000-0x00007FFFC8A09000-memory.dmp
memory/2640-11-0x00007FFFC89F0000-0x00007FFFC8E62000-memory.dmp
memory/2640-12-0x00007FFFC89F0000-0x00007FFFC8E62000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\48dfb0c4
| MD5 | 49a9768bfc3cc443eef6e780b61182c2 |
| SHA1 | 1a7300051ae3aab1dfda86262515f9cc51681b32 |
| SHA256 | f558829ddc8eb08782b1bb7b285dfff9cfdc37d35d8fa6a3b4ed32c1d35a0b62 |
| SHA512 | 3e25f9d2dd5c84a44ee87ea6c9ce4789f550da01f67a7fe4bbf52cd42ca36754a01c0b1b76d2b8e93685d5cd306da55dd5f6df0a842fa14bb5c5b7ea6a7f1bfd |
memory/4812-15-0x00007FFFCA190000-0x00007FFFCA385000-memory.dmp
memory/4812-17-0x000000007500E000-0x0000000075010000-memory.dmp
memory/4812-16-0x0000000075000000-0x000000007543C000-memory.dmp
memory/4812-18-0x0000000075000000-0x000000007543C000-memory.dmp
memory/4812-20-0x0000000075000000-0x000000007543C000-memory.dmp
memory/1404-21-0x00007FFFCA190000-0x00007FFFCA385000-memory.dmp
memory/1404-22-0x0000000000150000-0x00000000001B7000-memory.dmp
memory/1404-23-0x000000000006B000-0x0000000000072000-memory.dmp
memory/4812-24-0x000000007500E000-0x0000000075010000-memory.dmp
memory/1404-25-0x0000000000150000-0x00000000001B7000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-07-09 22:19
Reported
2024-07-09 22:22
Platform
win11-20240709-en
Max time kernel
90s
Max time network
98s
Command Line
Signatures
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1036 set thread context of 3160 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1036 wrote to memory of 3160 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 1036 wrote to memory of 3160 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 1036 wrote to memory of 3160 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 1036 wrote to memory of 3160 | N/A | C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 3160 wrote to memory of 2284 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
| PID 3160 wrote to memory of 2284 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
| PID 3160 wrote to memory of 2284 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
| PID 3160 wrote to memory of 2284 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe
"C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe"
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\SearchIndexer.exe
C:\Windows\SysWOW64\SearchIndexer.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | unwielldyzpwo.shop | udp |
| US | 172.67.158.68:443 | unwielldyzpwo.shop | tcp |
| US | 172.67.214.52:443 | bouncedgowp.shop | tcp |
| US | 104.21.81.196:443 | bannngwko.shop | tcp |
| US | 172.67.146.97:443 | bargainnykwo.shop | tcp |
| US | 8.8.8.8:53 | 68.158.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 52.214.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.81.21.104.in-addr.arpa | udp |
| US | 104.21.6.254:443 | affecthorsedpo.shop | tcp |
| US | 104.21.68.158:443 | radiationnopp.shop | tcp |
| US | 104.21.44.192:443 | answerrsdo.shop | tcp |
| US | 8.8.8.8:53 | 192.44.21.104.in-addr.arpa | udp |
| US | 172.67.134.88:443 | publicitttyps.shop | tcp |
| US | 104.21.81.128:443 | benchillppwo.shop | tcp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 104.21.83.48:443 | reinforcedirectorywd.shop | tcp |
Files
memory/1036-0-0x00007FFA4AA50000-0x00007FFA4AEBC000-memory.dmp
memory/1036-10-0x00007FFA4AA68000-0x00007FFA4AA69000-memory.dmp
memory/1036-11-0x00007FFA4AA50000-0x00007FFA4AEBC000-memory.dmp
memory/1036-12-0x00007FFA4AA50000-0x00007FFA4AEBC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4073fbb
| MD5 | 62d7b9c15ba0ebc73daa759ad778a577 |
| SHA1 | 5ccc7b92f75a51ca5e844325a325c92ca69a6a4c |
| SHA256 | 194556771d5144ee5c7d6ca3cf9b5b6af7a795860c21d7b8cddbed4f68d4b444 |
| SHA512 | da3961bd531a14cc457531954c21dd9c3e98b573146febe51eca58a182b7b06408bd09a2c7f51ebd83739658ae31a98fcaef5cd9d459280add3ba5e3902e4f17 |
memory/3160-15-0x00007FFA4AF00000-0x00007FFA4B109000-memory.dmp
memory/3160-17-0x00000000762DE000-0x00000000762E0000-memory.dmp
memory/3160-16-0x00000000762D0000-0x000000007670B000-memory.dmp
memory/3160-18-0x00000000762D0000-0x000000007670B000-memory.dmp
memory/3160-20-0x00000000762D0000-0x000000007670B000-memory.dmp
memory/2284-21-0x00007FFA4AF00000-0x00007FFA4B109000-memory.dmp
memory/2284-22-0x0000000000910000-0x0000000000977000-memory.dmp
memory/2284-23-0x000000000067B000-0x0000000000682000-memory.dmp
memory/3160-24-0x00000000762DE000-0x00000000762E0000-memory.dmp
memory/2284-25-0x0000000000910000-0x0000000000977000-memory.dmp