Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 10:52

General

  • Target

    RomanticCopyright.exe

  • Size

    10.0MB

  • MD5

    a737e94c53a284ae8c712eb7b2a2d209

  • SHA1

    a5d4113415f38413b5bcc2698e4aaf573cf8217c

  • SHA256

    677b2f7ea578826adb9c0f359c6436c364f712803080b38d81ecc1f25e5b97f5

  • SHA512

    ab87ef25549d4860269015d279aaf90a35bfd4c26457271a84cacf64c0a0c97d0e4c435136fb9defd2c64307d1bc1e9596ee278c868e101f6a2c657f87bd80b6

  • SSDEEP

    24576:AoN7JofAGrqyy7IyDCaNg9L+HlH8Zlna1bQ1SD:nBJ+AEty7IyOD9L+FUnv1I

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RomanticCopyright.exe
    "C:\Users\Admin\AppData\Local\Temp\RomanticCopyright.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Uni Uni.cmd & Uni.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:624
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa opssvc"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1448
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1812
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3988
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 796989
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4748
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "SigConsumptionDisciplinesSong" Envelope
        3⤵
        • System Location Discovery: System Language Discovery
        PID:860
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Wan + ..\Module + ..\Is + ..\Read + ..\Bibliography + ..\Match + ..\Qld I
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2792
      • C:\Users\Admin\AppData\Local\Temp\796989\Dept.com
        Dept.com I
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4048
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\796989\Dept.com

    Filesize

    921KB

    MD5

    78ba0653a340bac5ff152b21a83626cc

    SHA1

    b12da9cb5d024555405040e65ad89d16ae749502

    SHA256

    05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

    SHA512

    efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

  • C:\Users\Admin\AppData\Local\Temp\796989\I

    Filesize

    489KB

    MD5

    35431b1f719e5f8edd3ee4c56d590bc9

    SHA1

    c4667dc8990f03e9d3410e636957d5e9c73773c7

    SHA256

    427536f6a144672b8c5cd873d89c0374dab2c6383256347eef80b291729b99b0

    SHA512

    358ea29b484c7e7d493fec6270a7d3a6147852ba68f1c1f5fd9dc277e65dc24239b3718fb1ca986f354b5ebc954dae51f1e478db9d034a6f3417f6564d967fbd

  • C:\Users\Admin\AppData\Local\Temp\Bibliography

    Filesize

    91KB

    MD5

    0124e182e6ab32c597551f987c8efc9e

    SHA1

    5b1504b161a4748cfdff1463b4a370b7ee6caf14

    SHA256

    6484dd9a145b3178a2534dd802441a7b8d08a679c3241c11395c22bfa6ba6826

    SHA512

    70e76a19d9f3382e14463e9f79dee0db404482e714f1ca9b0330ad144c055b6c6464d9be6bbb94e7e05048925b8f2dd1049276b4982722b7e8a2d8fe7e2dd010

  • C:\Users\Admin\AppData\Local\Temp\Envelope

    Filesize

    1KB

    MD5

    930b977ce8cf5c68e617c0cc083b6915

    SHA1

    07ab167616b479dd68ea9cfdad2c51d180757596

    SHA256

    cd56fdf1345808d2c8d7a099dabc0d8667581b2888fa973eba477509f7875f3e

    SHA512

    a823ba03f129037c1feb58f7f5408070f512dc0d4044cbaa5aa28295a1e7d952b4172119a1609c271273e8b31ec6aed5d4b3a570cfc5bbc3846821eb1f791814

  • C:\Users\Admin\AppData\Local\Temp\Is

    Filesize

    56KB

    MD5

    84df1af81b44c0e9ac087f6b724dbfe1

    SHA1

    c2604b423fa3a1dfd0d41fd05364f390db94e0f0

    SHA256

    649f01b11633d4f45165010db7e1150d9ddf533fb2906cc7f26ebf4d3807d2c4

    SHA512

    b69aca208184bac03392a91a04cb737772576a2e29ad8a9549d1917c88e86d2fe12e22d9d1a9d01dd08eb1fefa27c13c26a14c41a0551e75dc72f3d64ce97403

  • C:\Users\Admin\AppData\Local\Temp\Match

    Filesize

    81KB

    MD5

    cce2e35fcd13802b894592bfa8bc4832

    SHA1

    e4b2ebbcea783891bae927d45a5d20a99b0d2c57

    SHA256

    49c9f0a08d446ac52e26ec0a79578d6e8cd0363adce44af727c537c2c127f278

    SHA512

    1f2ac58895ebf1a4c3989a5d76ffac39012fe511030508bfef1c164e0d8301f5f7ce2b87381604b1fa1a0443b5f6ca59948061f7a2f7634d6cdfa0880dc33798

  • C:\Users\Admin\AppData\Local\Temp\Module

    Filesize

    86KB

    MD5

    c3a23aa50702baadcffdb632c0781eaf

    SHA1

    26adb4b06851eb66a2fc3a4b2dc29055e6291e91

    SHA256

    e27aec3fc7086af2906fbf8d5a1a17e3f6871651f2663f8e5a3f5b44dd1e7d61

    SHA512

    545aefc06ba554d32183d8e96f3eafc6204e609d95c4bc8e8bbede315ccc78605d916533fabe995dd9e50b3a0ea63d12e64445e3346dafe24267281b8ca23284

  • C:\Users\Admin\AppData\Local\Temp\Qld

    Filesize

    39KB

    MD5

    47b8c8360718381beb75b78cad9989d4

    SHA1

    b1c9ed94b846670c0fbb0322b607b3e5affce120

    SHA256

    0d7c733985efc3042c41b2b26c32b7b8ce65ff9071ebdd872c3d0520a18351ed

    SHA512

    724d7030e1fab1adc5a9798e18cf75c11159cce1e57ab493a4595bdb14b68129c46a518616c427131963a7fd06e741965faca545fc5f007ab120cf28c1fe4d98

  • C:\Users\Admin\AppData\Local\Temp\Read

    Filesize

    62KB

    MD5

    b09b69ffbbb1c92beb55c7fd798c8c66

    SHA1

    a648e5a9721d8623dd6fca06d5295d1f07b13519

    SHA256

    4b54975d3405ea89c477daa9802d93b4a56683a901039d31e8eb1218deb742fa

    SHA512

    74d6cb22483b46a36887584c97060b16a1f8b6dcc280a8d9c7456d1c8c174b61487990af0bd7426b431ca7fde197ade2f5785784d27ab4371003feaecf2bb409

  • C:\Users\Admin\AppData\Local\Temp\Standing

    Filesize

    919KB

    MD5

    4414fe8f2635b6344106903d0f52455d

    SHA1

    70f135830f92733b3f0bbdfa35b1f0e36e9e5746

    SHA256

    578f765c46f2b2842f3455c37549326a9ea665aeedf5b86f6c3ff0be1a5f1244

    SHA512

    3c818c29afc91ce177db19c91026017cb567e2e6b0727ba271d66cc5c4f107661a677abc4ea5d1c281c56b3de166ed8ceaf298fa2ecb8f50a08bc1fcb6a0c91f

  • C:\Users\Admin\AppData\Local\Temp\Uni

    Filesize

    7KB

    MD5

    df066c1e3038ff1c556a50a0782e0de1

    SHA1

    ebad7031e3b7651898e3d916d0aa0cb09397d03a

    SHA256

    cb4ca6cf393c39f6fffab51f095518826e38d4eff4fb0f42aa1fb9a4d7ef0b3a

    SHA512

    649874ac78af57207d1d06059e9e5eac3814c13910d08e9325cb500434ad4cb553cdab659db3291839523d0ae636251ac925224db04ea29dde8be41e1d8cb194

  • C:\Users\Admin\AppData\Local\Temp\Wan

    Filesize

    74KB

    MD5

    cf96668f1c4973c8b43a72d90221e4d3

    SHA1

    3b512b9979650f556936a5b0866387820d112745

    SHA256

    720160bb915923d8cf54be5d580ac5c13e67a261daf3ae65f972435dd716cd07

    SHA512

    1d9c6299cce257f780252fe4805836f4f27914a816ef89d81119e2553008083754bdb16f25f895f85e35ccb5daa5c5f79fcff2d203b40c5444c88f9fc76b276e

  • memory/4048-209-0x0000000000200000-0x000000000025F000-memory.dmp

    Filesize

    380KB

  • memory/4048-211-0x0000000000200000-0x000000000025F000-memory.dmp

    Filesize

    380KB

  • memory/4048-210-0x0000000000200000-0x000000000025F000-memory.dmp

    Filesize

    380KB

  • memory/4048-212-0x0000000000200000-0x000000000025F000-memory.dmp

    Filesize

    380KB

  • memory/4048-214-0x0000000000200000-0x000000000025F000-memory.dmp

    Filesize

    380KB

  • memory/4048-213-0x0000000000200000-0x000000000025F000-memory.dmp

    Filesize

    380KB