Malware Analysis Report

2024-11-30 05:35

Sample ID 240709-18nhnsyhlq
Target !!SetUp_22334_Pa$sW0rd$$!.zip
SHA256 a042293778a18f71dc448b16c6b782490534789d43f59608678b3e89367b3a34
Tags
lumma stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a042293778a18f71dc448b16c6b782490534789d43f59608678b3e89367b3a34

Threat Level: Known bad

The file !!SetUp_22334_Pa$sW0rd$$!.zip was found to be: Known bad.

Malicious Activity Summary

lumma stealer

Lumma Stealer

Suspicious use of SetThreadContext

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-07-09 22:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-09 22:19

Reported

2024-07-09 22:22

Platform

win7-20240705-en

Max time kernel

121s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe"

Signatures

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe

"C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2500 -s 92

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-09 22:19

Reported

2024-07-09 22:22

Platform

win10v2004-20240709-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe"

Signatures

Lumma Stealer

stealer lumma

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2640 set thread context of 4812 N/A C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe C:\Windows\SysWOW64\more.com

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe N/A
N/A N/A C:\Windows\SysWOW64\more.com N/A

Processes

C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe

"C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe"

C:\Windows\SysWOW64\more.com

C:\Windows\SysWOW64\more.com

C:\Windows\SysWOW64\SearchIndexer.exe

C:\Windows\SysWOW64\SearchIndexer.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 unwielldyzpwo.shop udp
US 172.67.158.68:443 unwielldyzpwo.shop tcp
US 8.8.8.8:53 bouncedgowp.shop udp
US 104.21.93.198:443 bouncedgowp.shop tcp
US 8.8.8.8:53 bannngwko.shop udp
US 8.8.8.8:53 68.158.67.172.in-addr.arpa udp
US 104.21.81.196:443 bannngwko.shop tcp
US 8.8.8.8:53 bargainnykwo.shop udp
US 172.67.146.97:443 bargainnykwo.shop tcp
US 8.8.8.8:53 affecthorsedpo.shop udp
US 172.67.135.137:443 affecthorsedpo.shop tcp
US 8.8.8.8:53 198.93.21.104.in-addr.arpa udp
US 8.8.8.8:53 196.81.21.104.in-addr.arpa udp
US 8.8.8.8:53 97.146.67.172.in-addr.arpa udp
US 8.8.8.8:53 radiationnopp.shop udp
US 104.21.68.158:443 radiationnopp.shop tcp
US 8.8.8.8:53 answerrsdo.shop udp
US 104.21.44.192:443 answerrsdo.shop tcp
US 8.8.8.8:53 158.68.21.104.in-addr.arpa udp
US 8.8.8.8:53 137.135.67.172.in-addr.arpa udp
US 8.8.8.8:53 publicitttyps.shop udp
US 172.67.134.88:443 publicitttyps.shop tcp
US 8.8.8.8:53 benchillppwo.shop udp
US 172.67.160.230:443 benchillppwo.shop tcp
US 8.8.8.8:53 steamcommunity.com udp
GB 23.214.143.155:443 steamcommunity.com tcp
US 8.8.8.8:53 88.134.67.172.in-addr.arpa udp
US 8.8.8.8:53 192.44.21.104.in-addr.arpa udp
US 8.8.8.8:53 reinforcedirectorywd.shop udp
US 172.67.214.98:443 reinforcedirectorywd.shop tcp
US 8.8.8.8:53 155.143.214.23.in-addr.arpa udp
US 8.8.8.8:53 230.160.67.172.in-addr.arpa udp
US 8.8.8.8:53 98.214.67.172.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 8.179.89.13.in-addr.arpa udp

Files

memory/2640-0-0x00007FFFC89F0000-0x00007FFFC8E62000-memory.dmp

memory/2640-10-0x00007FFFC8A08000-0x00007FFFC8A09000-memory.dmp

memory/2640-11-0x00007FFFC89F0000-0x00007FFFC8E62000-memory.dmp

memory/2640-12-0x00007FFFC89F0000-0x00007FFFC8E62000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\48dfb0c4

MD5 49a9768bfc3cc443eef6e780b61182c2
SHA1 1a7300051ae3aab1dfda86262515f9cc51681b32
SHA256 f558829ddc8eb08782b1bb7b285dfff9cfdc37d35d8fa6a3b4ed32c1d35a0b62
SHA512 3e25f9d2dd5c84a44ee87ea6c9ce4789f550da01f67a7fe4bbf52cd42ca36754a01c0b1b76d2b8e93685d5cd306da55dd5f6df0a842fa14bb5c5b7ea6a7f1bfd

memory/4812-15-0x00007FFFCA190000-0x00007FFFCA385000-memory.dmp

memory/4812-17-0x000000007500E000-0x0000000075010000-memory.dmp

memory/4812-16-0x0000000075000000-0x000000007543C000-memory.dmp

memory/4812-18-0x0000000075000000-0x000000007543C000-memory.dmp

memory/4812-20-0x0000000075000000-0x000000007543C000-memory.dmp

memory/1404-21-0x00007FFFCA190000-0x00007FFFCA385000-memory.dmp

memory/1404-22-0x0000000000150000-0x00000000001B7000-memory.dmp

memory/1404-23-0x000000000006B000-0x0000000000072000-memory.dmp

memory/4812-24-0x000000007500E000-0x0000000075010000-memory.dmp

memory/1404-25-0x0000000000150000-0x00000000001B7000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-07-09 22:19

Reported

2024-07-09 22:22

Platform

win11-20240709-en

Max time kernel

90s

Max time network

98s

Command Line

"C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe"

Signatures

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1036 set thread context of 3160 N/A C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe C:\Windows\SysWOW64\more.com

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe N/A
N/A N/A C:\Windows\SysWOW64\more.com N/A

Processes

C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe

"C:\Users\Admin\AppData\Local\Temp\!!SetUp_22334_Pa$sW0rd$$!\Setup.exe"

C:\Windows\SysWOW64\more.com

C:\Windows\SysWOW64\more.com

C:\Windows\SysWOW64\SearchIndexer.exe

C:\Windows\SysWOW64\SearchIndexer.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 unwielldyzpwo.shop udp
US 172.67.158.68:443 unwielldyzpwo.shop tcp
US 172.67.214.52:443 bouncedgowp.shop tcp
US 104.21.81.196:443 bannngwko.shop tcp
US 172.67.146.97:443 bargainnykwo.shop tcp
US 8.8.8.8:53 68.158.67.172.in-addr.arpa udp
US 8.8.8.8:53 52.214.67.172.in-addr.arpa udp
US 8.8.8.8:53 196.81.21.104.in-addr.arpa udp
US 104.21.6.254:443 affecthorsedpo.shop tcp
US 104.21.68.158:443 radiationnopp.shop tcp
US 104.21.44.192:443 answerrsdo.shop tcp
US 8.8.8.8:53 192.44.21.104.in-addr.arpa udp
US 172.67.134.88:443 publicitttyps.shop tcp
US 104.21.81.128:443 benchillppwo.shop tcp
GB 23.214.143.155:443 steamcommunity.com tcp
US 104.21.83.48:443 reinforcedirectorywd.shop tcp

Files

memory/1036-0-0x00007FFA4AA50000-0x00007FFA4AEBC000-memory.dmp

memory/1036-10-0x00007FFA4AA68000-0x00007FFA4AA69000-memory.dmp

memory/1036-11-0x00007FFA4AA50000-0x00007FFA4AEBC000-memory.dmp

memory/1036-12-0x00007FFA4AA50000-0x00007FFA4AEBC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\4073fbb

MD5 62d7b9c15ba0ebc73daa759ad778a577
SHA1 5ccc7b92f75a51ca5e844325a325c92ca69a6a4c
SHA256 194556771d5144ee5c7d6ca3cf9b5b6af7a795860c21d7b8cddbed4f68d4b444
SHA512 da3961bd531a14cc457531954c21dd9c3e98b573146febe51eca58a182b7b06408bd09a2c7f51ebd83739658ae31a98fcaef5cd9d459280add3ba5e3902e4f17

memory/3160-15-0x00007FFA4AF00000-0x00007FFA4B109000-memory.dmp

memory/3160-17-0x00000000762DE000-0x00000000762E0000-memory.dmp

memory/3160-16-0x00000000762D0000-0x000000007670B000-memory.dmp

memory/3160-18-0x00000000762D0000-0x000000007670B000-memory.dmp

memory/3160-20-0x00000000762D0000-0x000000007670B000-memory.dmp

memory/2284-21-0x00007FFA4AF00000-0x00007FFA4B109000-memory.dmp

memory/2284-22-0x0000000000910000-0x0000000000977000-memory.dmp

memory/2284-23-0x000000000067B000-0x0000000000682000-memory.dmp

memory/3160-24-0x00000000762DE000-0x00000000762E0000-memory.dmp

memory/2284-25-0x0000000000910000-0x0000000000977000-memory.dmp