Resubmissions

10-10-2024 02:19

241010-crx4sazhnm 10

Analysis

  • max time kernel
    69s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-10-2024 02:19

General

  • Target

    Samples - 10-09-2024/4d0b50e69d551bf15ec0a44c8471f8766ca5b98bd3b462c3bf0e976c76c1308b.exe

  • Size

    5.9MB

  • MD5

    535a840121f23c3f10abd00891dce6e6

  • SHA1

    ff4c5ccd4c1f5ef53a6ae2fb8b0a5ecf3ebfbfad

  • SHA256

    4d0b50e69d551bf15ec0a44c8471f8766ca5b98bd3b462c3bf0e976c76c1308b

  • SHA512

    00d5d58c2cf1eb4752a7b487fff428eb8c6f6c32bd8ba76cbb452d48549196c13bd7171918e90be060d0c88e55421b4023b8f88cd8d5abc06b18836da88abbdd

  • SSDEEP

    49152:916jZg1DvQtV6sqFefM6xK5u3z+pSV4x9BLZmU6X9KpLbQQ4oda133/9kpjVfNzI:iji1SBqFebRz+hK

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://caffegclasiqwp.shop/api

https://stamppreewntnq.shop/api

https://stagedchheiqwo.shop/api

https://millyscroqwp.shop/api

https://evoliutwoqm.shop/api

https://condedqpwqm.shop/api

https://traineiwnqo.shop/api

https://locatedblsoqp.shop/api

https://cutesliprpepo.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3268
      • C:\Users\Admin\AppData\Local\Temp\Samples - 10-09-2024\4d0b50e69d551bf15ec0a44c8471f8766ca5b98bd3b462c3bf0e976c76c1308b.exe
        "C:\Users\Admin\AppData\Local\Temp\Samples - 10-09-2024\4d0b50e69d551bf15ec0a44c8471f8766ca5b98bd3b462c3bf0e976c76c1308b.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2180
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2180-0-0x0000000074CFE000-0x0000000074CFF000-memory.dmp

      Filesize

      4KB

    • memory/2180-1-0x0000000000E70000-0x000000000104A000-memory.dmp

      Filesize

      1.9MB

    • memory/2180-2-0x0000000074CF0000-0x00000000754A1000-memory.dmp

      Filesize

      7.7MB

    • memory/2180-3-0x0000000005AC0000-0x0000000005BC4000-memory.dmp

      Filesize

      1.0MB

    • memory/2180-4-0x0000000005EC0000-0x0000000005FC0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-6-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-16-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-44-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-14-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-38-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-60-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-58-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-68-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-66-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-64-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-63-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-54-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-52-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-50-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-48-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-46-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-56-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-42-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-40-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-36-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-34-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-32-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-28-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-26-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-24-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-22-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-20-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-18-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-12-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-10-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-30-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-8-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-5-0x0000000005EC0000-0x0000000005FBA000-memory.dmp

      Filesize

      1000KB

    • memory/2180-1079-0x0000000074CF0000-0x00000000754A1000-memory.dmp

      Filesize

      7.7MB

    • memory/2180-1080-0x00000000060A0000-0x000000000611A000-memory.dmp

      Filesize

      488KB

    • memory/2180-1081-0x0000000006030000-0x000000000607C000-memory.dmp

      Filesize

      304KB

    • memory/2180-1086-0x0000000074CF0000-0x00000000754A1000-memory.dmp

      Filesize

      7.7MB

    • memory/2180-1087-0x0000000074CF0000-0x00000000754A1000-memory.dmp

      Filesize

      7.7MB

    • memory/2180-1085-0x0000000074CF0000-0x00000000754A1000-memory.dmp

      Filesize

      7.7MB

    • memory/2180-1088-0x0000000074CFE000-0x0000000074CFF000-memory.dmp

      Filesize

      4KB

    • memory/2180-1089-0x0000000074CF0000-0x00000000754A1000-memory.dmp

      Filesize

      7.7MB

    • memory/2180-1090-0x0000000006AC0000-0x0000000007066000-memory.dmp

      Filesize

      5.6MB

    • memory/2180-1091-0x00000000061D0000-0x0000000006224000-memory.dmp

      Filesize

      336KB

    • memory/2180-1095-0x0000000074CF0000-0x00000000754A1000-memory.dmp

      Filesize

      7.7MB

    • memory/3052-1096-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB