Analysis Overview
SHA256
edef6777be8dbb15748bcf1332c0a7e49e5d8b8793ff23ccfb41da2d3ff1c0cc
Threat Level: Known bad
The file !~!SetUp_2025_Pa$$W0rd$s!!%!~.zip was found to be: Known bad.
Malicious Activity Summary
Lumma Stealer
Suspicious use of SetThreadContext
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-07-10 23:21
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-10 23:21
Reported
2024-07-10 23:26
Platform
win7-20240705-en
Max time kernel
238s
Max time network
240s
Command Line
Signatures
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1212 set thread context of 1692 | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | C:\Windows\SysWOW64\more.com |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe
"C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe"
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\SearchIndexer.exe
C:\Windows\SysWOW64\SearchIndexer.exe
Network
Files
memory/1212-0-0x0000000074FC0000-0x0000000075057000-memory.dmp
memory/1212-1-0x0000000077AC0000-0x0000000077C69000-memory.dmp
memory/1212-6-0x0000000074FC0000-0x0000000075057000-memory.dmp
memory/1212-5-0x0000000074FD2000-0x0000000074FD4000-memory.dmp
memory/1212-7-0x0000000074FC0000-0x0000000075057000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\7c30a9dd
| MD5 | 76844f761ce0f2907fe9e4065cf7d177 |
| SHA1 | f7f0fe3e81f0cba433b605e89bb4ede62649135d |
| SHA256 | 5462f42c0c30067af4c9082c37e392bc645fa77bf6c97cd09f8c16969264d09f |
| SHA512 | d63e6594de1d202a6144c46d2bedb310e6230cec58cebd6988af25f45ef892f6d6d62a575a37e68af15e22bafc7d89526090497cf8041ac053af35fca2c3bbf1 |
memory/1692-10-0x0000000074FC0000-0x0000000075057000-memory.dmp
memory/1692-12-0x0000000077AC0000-0x0000000077C69000-memory.dmp
memory/1692-13-0x0000000074FC0000-0x0000000075057000-memory.dmp
memory/1692-14-0x0000000074FC0000-0x0000000075057000-memory.dmp
memory/1692-16-0x0000000074FC0000-0x0000000075057000-memory.dmp
memory/2812-17-0x0000000077AC0000-0x0000000077C69000-memory.dmp
memory/2812-18-0x0000000000400000-0x000000000046B000-memory.dmp
memory/2812-19-0x0000000000400000-0x000000000046B000-memory.dmp
memory/2812-20-0x000000000026D000-0x0000000000275000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-10 23:21
Reported
2024-07-10 23:26
Platform
win10v2004-20240709-en
Max time kernel
148s
Max time network
280s
Command Line
Signatures
Lumma Stealer
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1988 set thread context of 2312 | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | C:\Windows\SysWOW64\more.com |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe
"C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe"
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\SearchIndexer.exe
C:\Windows\SysWOW64\SearchIndexer.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | bittercoldzzdwu.shop | udp |
| US | 104.21.25.179:443 | bittercoldzzdwu.shop | tcp |
| US | 8.8.8.8:53 | bouncedgowp.shop | udp |
| US | 104.21.93.198:443 | bouncedgowp.shop | tcp |
| US | 8.8.8.8:53 | bannngwko.shop | udp |
| US | 172.67.146.61:443 | bannngwko.shop | tcp |
| US | 8.8.8.8:53 | bargainnykwo.shop | udp |
| US | 8.8.8.8:53 | 179.25.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.170.16.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 61.146.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.93.21.104.in-addr.arpa | udp |
| US | 172.67.146.97:443 | bargainnykwo.shop | tcp |
| US | 8.8.8.8:53 | affecthorsedpo.shop | udp |
| US | 104.21.6.254:443 | affecthorsedpo.shop | tcp |
| US | 8.8.8.8:53 | radiationnopp.shop | udp |
| US | 172.67.196.169:443 | radiationnopp.shop | tcp |
| US | 8.8.8.8:53 | answerrsdo.shop | udp |
| US | 172.67.203.63:443 | answerrsdo.shop | tcp |
| US | 8.8.8.8:53 | 97.146.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.6.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | publicitttyps.shop | udp |
| US | 172.67.134.88:443 | publicitttyps.shop | tcp |
| US | 8.8.8.8:53 | benchillppwo.shop | udp |
| US | 172.67.160.230:443 | benchillppwo.shop | tcp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 8.8.8.8:53 | 63.203.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 169.196.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.134.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 230.160.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | reinforcedirectorywd.shop | udp |
| US | 104.21.83.48:443 | reinforcedirectorywd.shop | tcp |
| US | 8.8.8.8:53 | 155.143.214.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.83.21.104.in-addr.arpa | udp |
Files
memory/1988-0-0x0000000073880000-0x0000000073894000-memory.dmp
memory/1988-1-0x00007FFB4B1F0000-0x00007FFB4B3E5000-memory.dmp
memory/1988-5-0x0000000073892000-0x0000000073894000-memory.dmp
memory/1988-6-0x0000000073880000-0x0000000073894000-memory.dmp
memory/1988-7-0x0000000073880000-0x0000000073894000-memory.dmp
memory/2312-10-0x0000000073880000-0x0000000073894000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\404b5d76
| MD5 | f3698937632757e46e6ba7e8a0384736 |
| SHA1 | 3279fe11566c90dbdb9877561826581bc5743444 |
| SHA256 | 27b79b340a7e17fbf8601b3d6c0734c2636402871a3f57d186457a7550c4c09c |
| SHA512 | d96dcdac670c7abd5638be2f3487a7d39c9f2f015c770a7127a640f770fb6bacdfd2b24cb1f3816dc853e3b6d8db6ebfa455aef2395b503c6b36ac9208b42ee4 |
memory/2312-12-0x00007FFB4B1F0000-0x00007FFB4B3E5000-memory.dmp
memory/2312-13-0x0000000073880000-0x0000000073894000-memory.dmp
memory/2312-14-0x0000000073880000-0x0000000073894000-memory.dmp
memory/2312-16-0x0000000073880000-0x0000000073894000-memory.dmp
memory/3660-17-0x00007FFB4B1F0000-0x00007FFB4B3E5000-memory.dmp
memory/3660-18-0x0000000000DD0000-0x0000000000E3B000-memory.dmp
memory/3660-19-0x000000000095B000-0x0000000000962000-memory.dmp
memory/3660-20-0x0000000000DD0000-0x0000000000E3B000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-07-10 23:21
Reported
2024-07-10 23:26
Platform
win11-20240709-en
Max time kernel
214s
Max time network
280s
Command Line
Signatures
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3640 set thread context of 4688 | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | C:\Windows\SysWOW64\more.com |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\more.com | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe
"C:\Users\Admin\AppData\Local\Temp\!~!SetUp_2025_Pa$$W0rd$s!!%!~\Setup.exe"
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\SearchIndexer.exe
C:\Windows\SysWOW64\SearchIndexer.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bittercoldzzdwu.shop | udp |
| US | 172.67.134.113:443 | bittercoldzzdwu.shop | tcp |
| US | 104.21.93.198:443 | bouncedgowp.shop | tcp |
| US | 8.8.8.8:53 | 113.134.67.172.in-addr.arpa | udp |
| US | 104.21.81.196:443 | bannngwko.shop | tcp |
| US | 104.21.47.93:443 | bargainnykwo.shop | tcp |
| US | 172.67.135.137:443 | affecthorsedpo.shop | tcp |
| US | 8.8.8.8:53 | 93.47.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | radiationnopp.shop | udp |
| US | 172.67.196.169:443 | radiationnopp.shop | tcp |
| US | 104.21.44.192:443 | answerrsdo.shop | tcp |
| US | 172.67.134.88:443 | publicitttyps.shop | tcp |
| US | 172.67.160.230:443 | benchillppwo.shop | tcp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 172.67.214.98:443 | reinforcedirectorywd.shop | tcp |
Files
memory/3640-0-0x0000000074390000-0x00000000743A5000-memory.dmp
memory/3640-1-0x00007FFEE8880000-0x00007FFEE8A89000-memory.dmp
memory/3640-5-0x00000000743A2000-0x00000000743A4000-memory.dmp
memory/3640-6-0x0000000074390000-0x00000000743A5000-memory.dmp
memory/3640-7-0x0000000074390000-0x00000000743A5000-memory.dmp
memory/4688-10-0x0000000074390000-0x00000000743A5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\411b1b89
| MD5 | 329fbb3e27d8781439e61a57e9053dd9 |
| SHA1 | 73e67e926368927da584e1d2fec1f97974b0145b |
| SHA256 | 01d1b6f18720999fa29924ecb261ccfc3cea7d3aecccd7cdfce964df5bb452a5 |
| SHA512 | d03d7d6762e60e60e6d24b6b3c0229a67dc5129a4640b37844486d429cc716aaf803b055e16a39acfa54c7098db308531e4c9245004f075a2e46705aad58cdbf |
memory/4688-12-0x00007FFEE8880000-0x00007FFEE8A89000-memory.dmp
memory/4688-13-0x0000000074390000-0x00000000743A5000-memory.dmp
memory/4688-14-0x0000000074390000-0x00000000743A5000-memory.dmp
memory/4688-16-0x0000000074390000-0x00000000743A5000-memory.dmp
memory/784-17-0x00007FFEE8880000-0x00007FFEE8A89000-memory.dmp
memory/784-18-0x0000000000060000-0x00000000000CB000-memory.dmp
memory/784-19-0x000000000010B000-0x0000000000112000-memory.dmp
memory/784-20-0x0000000000060000-0x00000000000CB000-memory.dmp