Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:37
Static task
static1
Behavioral task
behavioral1
Sample
LummaC2 PDFGTR 30.09.2023 03_35_44.zip
Resource
win7-20240903-en
General
-
Target
LummaC2 PDFGTR 30.09.2023 03_35_44.zip
-
Size
269KB
-
MD5
59cb6190cdf3d4a5bd3237b2593f670c
-
SHA1
0be7918891ad8c911b4cdbbc0cf2ffe5375c0460
-
SHA256
74464112df33bed8840ec9006a3362d8b2065a24bcc03d6a602988e2babc10ed
-
SHA512
20643cfb6999db20a5e7981c3b4f4809e1cad099cfbd2990c4afa52049450b1627c9cabe84ae5fccef622120f88e87e1541d537e03bde6bf9d20fc4ec12f0d62
-
SSDEEP
6144:+YN2GVwVAT2tn70RKcxA+Ixx2zmtsqBD7zlnazZZK:+YN2GVQtyq3Jsq1nlnaznK
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zO8E6A7CD6\LummaC2.exe family_lumma_v4 -
Lumma family
-
Executes dropped EXE 1 IoCs
Processes:
LummaC2.exepid process 2408 LummaC2.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
LummaC2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LummaC2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7zFM.exepid process 1768 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 1768 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 1768 7zFM.exe Token: 35 1768 7zFM.exe Token: SeSecurityPrivilege 1768 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid process 1768 7zFM.exe 1768 7zFM.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7zFM.exedescription pid process target process PID 1768 wrote to memory of 2408 1768 7zFM.exe LummaC2.exe PID 1768 wrote to memory of 2408 1768 7zFM.exe LummaC2.exe PID 1768 wrote to memory of 2408 1768 7zFM.exe LummaC2.exe PID 1768 wrote to memory of 2408 1768 7zFM.exe LummaC2.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\LummaC2 PDFGTR 30.09.2023 03_35_44.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\7zO8E6A7CD6\LummaC2.exe"C:\Users\Admin\AppData\Local\Temp\7zO8E6A7CD6\LummaC2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD5c31a6c985125a3aaab3c47bc5dd4017b
SHA1e5de8e428613592d8fca3bffdc0a034e2888504e
SHA2566a9f26cbde375242e55e273a2643c74215baca8951726fc20e47b3e5df887f6b
SHA512007966c6b361eafee15fd7c454545da0098d3dfe1202dedaf95d4783dfa91ec71f87fa67c0fa684292ded75c8a05cfa0a0908570921a14ab24d88c9ffc4d343f