Analysis

  • max time kernel
    139s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 16:48

General

  • Target

    2644-4-0x00000000011A0000-0x00000000014AB000-memory.exe

  • Size

    3.0MB

  • MD5

    356a12c2ca822f96da4d9d71b8715897

  • SHA1

    a1065931910b9412bfa33b75f85bb32daebeb3bc

  • SHA256

    547009019c23507415b715f7dd85ca4db5d1522f80b585a7d15717f27df0b7c7

  • SHA512

    9ae6904e9b0c67d969cb9e193cfe73f662269555e70c0e98482a72eeaa2e4283ac9ccf8e0f809a77cb5f9919f785c41474fa2ced6c81b7c2f5736ff776597f86

  • SSDEEP

    24576:IX4DkqyXLuKPEd6hXssmeSlyjriq+HaXfAWM+yLs8Hj1Il3FEVQiwuBc0AiWZkb0:5JJ8QISXgHiq+sWJhzwuy4NSA61FxUc

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://clearancek.site

https://licendfilteo.site

https://spirittunek.store

https://bathdoomgaz.store

https://studennotediw.store

https://dissapoiznw.store

https://eaglepawnoy.store

https://mobbipenju.store

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2644-4-0x00000000011A0000-0x00000000014AB000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2644-4-0x00000000011A0000-0x00000000014AB000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 216
      2⤵
      • Program crash
      PID:3024
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4080 -ip 4080
    1⤵
      PID:1536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4080-0-0x00000000009F0000-0x0000000000CFB000-memory.dmp

      Filesize

      3.0MB