Analysis

  • max time kernel
    91s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 15:26

General

  • Target

  • Size

    752.8MB

  • MD5

    d77e9cb60a0b25d28b9041073f9ae2b4

  • SHA1

    abc1f1e9dc55bf9c4cadbb43e21f451fd10035d0

  • SHA256

    bffa8d4d3509f9af8531ee64e6f889ee11700f9684feddaa5c806439c6b876db

  • SHA512

    10d4fe0b15b3c790e37f85888ebbcaca77d018145f129084936b2a941a4f40b08e0fa2e35dc46edf57565b6426516a122c8d32b5febc2acd8bfdd4ce092ea695

  • SSDEEP

    196608:Ps4d7ZeXQ6vWpb1tHFSIjYwJS1QmpOOUjNSoisC2MqGXakykKg:dZGysuYX/AdjNfFqnyk1

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://complainnykso.shop/api

https://basedsymsotp.shop/api

https://charistmatwio.shop/api

https://grassemenwji.shop/api

https://stitchmiscpaew.shop/api

https://commisionipwn.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3580

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3580-0-0x0000000000340000-0x0000000000399000-memory.dmp

          Filesize

          356KB

        • memory/3580-1-0x0000000000340000-0x0000000000399000-memory.dmp

          Filesize

          356KB

        • memory/3580-5-0x0000000000340000-0x0000000000399000-memory.dmp

          Filesize

          356KB

        • memory/3580-7-0x0000000000340000-0x0000000000399000-memory.dmp

          Filesize

          356KB