Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2024 14:52

General

  • Target

    b4774f8d0d979bc0cc408ab7395851929a4e544fdd7867f26356d5e10275fbd4N.exe

  • Size

    287KB

  • MD5

    44d3ac4ec21d2d10682490b64f8a8ca0

  • SHA1

    aad850503b0f4abad3fed579873cd6346d1f2148

  • SHA256

    b4774f8d0d979bc0cc408ab7395851929a4e544fdd7867f26356d5e10275fbd4

  • SHA512

    2ec0263e6b94db65557da0a9559415493b6a77bf9c6a93919d56b116105c76e95e80102d60b322b2e449f0abecbd0f2bf2e02ddd71b2a8b0dbe58da2e39b2dac

  • SSDEEP

    6144:5Fs3nkwUA7USB6i5agrKMi3Bb6+NHJf8UuaakZWcbo4qjV+Vh9vieg:QEU9B6lVjb/NHpJdadco4qxWh9vie

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://moutheventushz.shop/api

https://respectabosiz.shop/api

https://bakedstusteeb.shop/api

https://conceszustyb.shop/api

https://nightybinybz.shop/api

https://standartedby.shop/api

https://mutterissuen.shop/api

https://worddosofrm.shop/api

https://berrylinyj.cyou

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4774f8d0d979bc0cc408ab7395851929a4e544fdd7867f26356d5e10275fbd4N.exe
    "C:\Users\Admin\AppData\Local\Temp\b4774f8d0d979bc0cc408ab7395851929a4e544fdd7867f26356d5e10275fbd4N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gdi32.dll

    Filesize

    411KB

    MD5

    54c1268155b9a8009e66f623954f7615

    SHA1

    2ad7d0075859fafbbc5c25ca5f684de877e20003

    SHA256

    4dd870b977760011c70f6635a1af2263500b4f34658ba727ac7b94a19162cb68

    SHA512

    62abadfa50adbd8a06ae6622ab764f69cba433a4ca15bb73918ecb84e990b9afe43e4d99d30ca3acde0a3f4ad7b83972399a892d6ae50063923f27f03efccc69

  • memory/976-14-0x0000000000FD0000-0x0000000001038000-memory.dmp

    Filesize

    416KB

  • memory/976-17-0x0000000000FD0000-0x0000000001038000-memory.dmp

    Filesize

    416KB

  • memory/976-9-0x0000000000FD0000-0x0000000001038000-memory.dmp

    Filesize

    416KB

  • memory/1572-0-0x000000007487E000-0x000000007487F000-memory.dmp

    Filesize

    4KB

  • memory/1572-1-0x0000000000E00000-0x0000000000E50000-memory.dmp

    Filesize

    320KB

  • memory/1572-2-0x0000000005860000-0x0000000005866000-memory.dmp

    Filesize

    24KB

  • memory/1572-18-0x0000000074870000-0x0000000075020000-memory.dmp

    Filesize

    7.7MB

  • memory/1572-19-0x0000000074870000-0x0000000075020000-memory.dmp

    Filesize

    7.7MB