Analysis Overview
SHA256
672ac4cdbb001fb51206fa708d6daf9f9972d757e97ba2ff3730bab05aef90a8
Threat Level: Known bad
The file 672ac4cdbb001fb51206fa708d6daf9f9972d757e97ba2ff3730bab05aef90a8 was found to be: Known bad.
Malicious Activity Summary
Lumma Stealer
Suspicious use of SetThreadContext
Unsigned PE
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-07-09 23:21
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-09 23:21
Reported
2024-07-09 23:24
Platform
win7-20240704-en
Max time kernel
117s
Max time network
122s
Command Line
Signatures
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2312 set thread context of 1600 | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | C:\Windows\SysWOW64\more.com |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe
"C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe"
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\SearchIndexer.exe
C:\Windows\SysWOW64\SearchIndexer.exe
Network
Files
memory/2312-0-0x000007FEFE410000-0x000007FEFE5E7000-memory.dmp
memory/2312-4-0x000007FEFE428000-0x000007FEFE429000-memory.dmp
memory/2312-5-0x000007FEFE410000-0x000007FEFE5E7000-memory.dmp
memory/2312-8-0x0000000000400000-0x000000000045E000-memory.dmp
memory/2312-6-0x000007FEFE410000-0x000007FEFE5E7000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\67af4145
| MD5 | d49c42ef4268c38d0394e36c28a46e33 |
| SHA1 | 07001f61241d74653845c3ed4e66f3c0b605b644 |
| SHA256 | da469ba8795f82672d4e89500b701b17f10fbaea2a6ea98323fed6fcb4d18b81 |
| SHA512 | bd85835fea8e7a120a5542ee1be226ffaba9aa3a651d08fa676cadd591972b65dcee1d6e3d7f7b8914666f9b82b76b0d30590ebf1413021f445afab6c004e430 |
memory/1600-10-0x0000000077340000-0x00000000774E9000-memory.dmp
memory/1600-12-0x000000007674E000-0x0000000076750000-memory.dmp
memory/1600-11-0x0000000076740000-0x00000000768DD000-memory.dmp
memory/1600-13-0x0000000076740000-0x00000000768DD000-memory.dmp
memory/1600-15-0x0000000076740000-0x00000000768DD000-memory.dmp
memory/3056-16-0x0000000077340000-0x00000000774E9000-memory.dmp
memory/3056-17-0x0000000000400000-0x0000000000453000-memory.dmp
memory/3056-18-0x0000000000400000-0x0000000000453000-memory.dmp
memory/3056-19-0x000000000047D000-0x0000000000485000-memory.dmp
memory/1600-20-0x000000007674E000-0x0000000076750000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-09 23:21
Reported
2024-07-09 23:23
Platform
win10v2004-20240709-en
Max time kernel
93s
Max time network
124s
Command Line
Signatures
Lumma Stealer
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1452 set thread context of 1000 | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | C:\Windows\SysWOW64\more.com |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1452 wrote to memory of 1000 | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 1452 wrote to memory of 1000 | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 1452 wrote to memory of 1000 | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 1452 wrote to memory of 1000 | N/A | C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe | C:\Windows\SysWOW64\more.com |
| PID 1000 wrote to memory of 1912 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
| PID 1000 wrote to memory of 1912 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
| PID 1000 wrote to memory of 1912 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
| PID 1000 wrote to memory of 1912 | N/A | C:\Windows\SysWOW64\more.com | C:\Windows\SysWOW64\SearchIndexer.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe
"C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\Setup.exe"
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\SearchIndexer.exe
C:\Windows\SysWOW64\SearchIndexer.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | bittercoldzzdwu.shop | udp |
| US | 172.67.134.113:443 | bittercoldzzdwu.shop | tcp |
| US | 8.8.8.8:53 | bouncedgowp.shop | udp |
| US | 172.67.214.52:443 | bouncedgowp.shop | tcp |
| US | 8.8.8.8:53 | 113.134.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | bannngwko.shop | udp |
| US | 104.21.81.196:443 | bannngwko.shop | tcp |
| US | 8.8.8.8:53 | bargainnykwo.shop | udp |
| US | 172.67.146.97:443 | bargainnykwo.shop | tcp |
| US | 8.8.8.8:53 | 196.81.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 52.214.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | affecthorsedpo.shop | udp |
| US | 172.67.135.137:443 | affecthorsedpo.shop | tcp |
| US | 8.8.8.8:53 | radiationnopp.shop | udp |
| US | 172.67.196.169:443 | radiationnopp.shop | tcp |
| US | 8.8.8.8:53 | answerrsdo.shop | udp |
| US | 104.21.44.192:443 | answerrsdo.shop | tcp |
| US | 8.8.8.8:53 | 97.146.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.135.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 169.196.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | publicitttyps.shop | udp |
| US | 172.67.134.88:443 | publicitttyps.shop | tcp |
| US | 8.8.8.8:53 | benchillppwo.shop | udp |
| US | 104.21.81.128:443 | benchillppwo.shop | tcp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| US | 8.8.8.8:53 | 192.44.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.134.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 128.81.21.104.in-addr.arpa | udp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 8.8.8.8:53 | reinforcedirectorywd.shop | udp |
| US | 104.21.83.48:443 | reinforcedirectorywd.shop | tcp |
| US | 8.8.8.8:53 | 155.143.214.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.83.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
Files
memory/1452-0-0x0000000000800000-0x000000000085E000-memory.dmp
memory/1452-1-0x00007FF8BCA70000-0x00007FF8BCEE2000-memory.dmp
memory/1452-5-0x00007FF8BCA88000-0x00007FF8BCA89000-memory.dmp
memory/1452-6-0x00007FF8BCA70000-0x00007FF8BCEE2000-memory.dmp
memory/1452-7-0x00007FF8BCA70000-0x00007FF8BCEE2000-memory.dmp
memory/1452-9-0x0000000000800000-0x000000000085E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ed699b67
| MD5 | 0c8a3f727cc0eb0eb1bddc4a69b7b183 |
| SHA1 | 3566dc3242b758f0ee06c5e03dcf734a43a36647 |
| SHA256 | 3c4e39f58ce834215a1b35799833283f52f889ecc7aadcad0a998b4eaf2ffae5 |
| SHA512 | 18a558440942d9b0b6f6338c6ab34b07a4e51ec1efbb13134db7a011cfdd0f5e476b252b720c8f9925c63b237cc5c34481c509e3b151a45dc7f622691896ba88 |
memory/1000-11-0x00007FF8BD430000-0x00007FF8BD625000-memory.dmp
memory/1000-13-0x000000007692E000-0x0000000076930000-memory.dmp
memory/1000-12-0x0000000076920000-0x0000000076D5C000-memory.dmp
memory/1000-14-0x0000000076920000-0x0000000076D5C000-memory.dmp
memory/1000-16-0x0000000076920000-0x0000000076D5C000-memory.dmp
memory/1912-17-0x00007FF8BD430000-0x00007FF8BD625000-memory.dmp
memory/1912-18-0x00000000007E0000-0x0000000000833000-memory.dmp
memory/1912-20-0x0000000000D5B000-0x0000000000D62000-memory.dmp
memory/1000-19-0x000000007692E000-0x0000000076930000-memory.dmp
memory/1912-21-0x00000000007E0000-0x0000000000833000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-07-09 23:21
Reported
2024-07-09 23:23
Platform
win7-20240705-en
Max time kernel
16s
Max time network
17s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\tak_deco_lib.dll,#1
Network
Files
memory/3052-1-0x00000000002E0000-0x000000000033E000-memory.dmp
memory/3052-0-0x00000000002E0000-0x000000000033E000-memory.dmp
Analysis: behavioral4
Detonation Overview
Submitted
2024-07-09 23:21
Reported
2024-07-09 23:23
Platform
win10v2004-20240709-en
Max time kernel
148s
Max time network
151s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\!ŞetUp_64851--#PaSꞨKḙy#$$\tak_deco_lib.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.143.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
Files
memory/2088-0-0x0000000000400000-0x000000000045E000-memory.dmp