Analysis

  • max time kernel
    292s
  • max time network
    187s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27/11/2024, 14:15

General

  • Target

    Хеnо-v1.0.9-x64-New.zip

  • Size

    53.1MB

  • MD5

    9b996dc817d677a55205a07184b0c832

  • SHA1

    9cac6d68c56ce951bf88d6482be951ab07700482

  • SHA256

    cf0f9c571d661f6aad6703cb6b35c56888097773460678b1c1c76a1c1f3979a2

  • SHA512

    f78a83ce43884b6c30b387bd59aa8fb76aba63fdb6cd818ccf23d18be12991937e73e82d3492cb138db5f016135fac3bf6329ede8a1d787de32a9bc9f3b67250

  • SSDEEP

    1572864:EjiU+xf/VqoBoN8HR+QxyQNEquD9efciBqK:EjihhkWoN0xyQNjuxwb

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://crib-endanger.sbs

https://faintbl0w.sbs

https://300snails.sbs

https://bored-light.sbs

https://3xc1aimbl0w.sbs

https://pull-trucker.sbs

https://fleez-inc.sbs

https://thicktoys.sbs

https://milk-of-horned.cyou

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Хеnо-v1.0.9-x64-New.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\7zO0A81461C\Xenо.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO0A81461C\Xenо.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4360
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 856
        3⤵
        • Program crash
        PID:844
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4360 -ip 4360
    1⤵
      PID:2440
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:5088
      • C:\Windows\system32\BackgroundTransferHost.exe
        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
        1⤵
        • Modifies registry class
        PID:4844
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc297acc40,0x7ffc297acc4c,0x7ffc297acc58
          2⤵
            PID:3376
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1780,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1776 /prefetch:2
            2⤵
              PID:3128
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2124,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2132 /prefetch:3
              2⤵
                PID:2820
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:8
                2⤵
                  PID:4584
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:1
                  2⤵
                    PID:1104
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3324 /prefetch:1
                    2⤵
                      PID:4676
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4480,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3564 /prefetch:1
                      2⤵
                        PID:3796
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4344,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4736 /prefetch:1
                        2⤵
                          PID:4484
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4740,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4880 /prefetch:1
                          2⤵
                            PID:3312
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3292,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3412 /prefetch:1
                            2⤵
                              PID:4132
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4612,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4316 /prefetch:8
                              2⤵
                                PID:4712
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3756,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4620 /prefetch:1
                                2⤵
                                  PID:3572
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4508,i,14358475279820640191,14622379766617324211,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4704 /prefetch:1
                                  2⤵
                                    PID:3844
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:3464
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:3548
                                    • C:\Program Files\VideoLAN\VLC\vlc.exe
                                      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ConvertCompress.ADTS"
                                      1⤵
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2504

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\323e080a-e3d0-46b2-9153-8ed0340a4624.tmp

                                      Filesize

                                      116KB

                                      MD5

                                      8caa29c3ceb605608d15ce2ea4b56f9d

                                      SHA1

                                      846b00e32d64134fbfab64480208307a41aa4943

                                      SHA256

                                      dbbabd74d2672955b9da74fc49e0357fde0404c919817afead0de6f968ec78c9

                                      SHA512

                                      952c4fc91cb196b95801f595ab9246357aef0e4584bbdb7e613cff8a5527baf8d8a0b736972d7bc994c575e84170934fd93dd6029307aa9dff567abf493b79fc

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                      Filesize

                                      649B

                                      MD5

                                      bf8d7a79cc1acdc7e054251440ce6915

                                      SHA1

                                      d594b3d0bd4239eb7bf98ba2b3a29d774727cc42

                                      SHA256

                                      264820743259b116f81ded7eb673ffa7c25ef7eca485adefcbb1360b87b80b2a

                                      SHA512

                                      825a46afc8c4a5737768aae80b439993cad30df5e04316e50911d67d4304c57b779c338a796257b66c3c135a412492cc8f96859290bd891ef51953efc4723a31

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      fb74f48b5a24b1479a593fb2a12fef33

                                      SHA1

                                      6126104dd2454cfea41ab984c46b7129411169d0

                                      SHA256

                                      4a7b272f219946986c9d710c901bdf15bf5798b73b59cf2aac62557733d10273

                                      SHA512

                                      214942a1415776e53fe40c186e1377b252f0de556013538f27406401d3ff73ebc2b4605616e5192696055033e28f64598e544864c0e81e8c94da565c55aafd6e

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      9KB

                                      MD5

                                      b672c246f7ff1ede0c23550f94fd6b43

                                      SHA1

                                      b61b82f772ff6bc94543496058afa37a5688b6a9

                                      SHA256

                                      1e83cd501540081a944c1c6c08268e60c738664a7a73d0f84a9c934bc45cfd39

                                      SHA512

                                      ca81c5b3432c671a18034bf87ffa73ffb4819fc05c816e6d2f9dfbaff6c2a7e3576638a6ae0fd2ab9f9391d217264226197df940ae1402bc939614e48742e17b

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      116KB

                                      MD5

                                      dcefb546ecfbfcf430cf7bf053d7e217

                                      SHA1

                                      3ef2d615926a91488029ea0d11944cd1c86c91be

                                      SHA256

                                      b9373ad2bad2588ec8a1d7af9f73032a7e68b51fde859a8167b009a17a1344c8

                                      SHA512

                                      d320244e36f8e44984b7dbf28bd35a010d46bf0bdfc07b313c4d77cabf9c771d2a2fb914b039660c4fbdb8135d6a3e5d0ea38673b2f9a191128024adbd39ec47

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • memory/2504-173-0x00007FFC3B6A0000-0x00007FFC3B6E1000-memory.dmp

                                      Filesize

                                      260KB

                                    • memory/2504-166-0x00007FFC3F080000-0x00007FFC3F097000-memory.dmp

                                      Filesize

                                      92KB

                                    • memory/2504-172-0x00007FFC28580000-0x00007FFC2878B000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/2504-175-0x00007FFC3B670000-0x00007FFC3B691000-memory.dmp

                                      Filesize

                                      132KB

                                    • memory/2504-176-0x00007FFC3B650000-0x00007FFC3B668000-memory.dmp

                                      Filesize

                                      96KB

                                    • memory/2504-177-0x00007FFC3B630000-0x00007FFC3B641000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/2504-178-0x00007FFC3B610000-0x00007FFC3B621000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/2504-162-0x00007FF6EE320000-0x00007FF6EE418000-memory.dmp

                                      Filesize

                                      992KB

                                    • memory/2504-163-0x00007FFC44960000-0x00007FFC44994000-memory.dmp

                                      Filesize

                                      208KB

                                    • memory/2504-167-0x00007FFC3F060000-0x00007FFC3F071000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/2504-171-0x00007FFC3B6F0000-0x00007FFC3B701000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/2504-168-0x00007FFC3C050000-0x00007FFC3C067000-memory.dmp

                                      Filesize

                                      92KB

                                    • memory/2504-179-0x00007FFC3B5F0000-0x00007FFC3B601000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/2504-170-0x00007FFC3BB50000-0x00007FFC3BB6D000-memory.dmp

                                      Filesize

                                      116KB

                                    • memory/2504-169-0x00007FFC3BB70000-0x00007FFC3BB81000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/2504-164-0x00007FFC29180000-0x00007FFC29436000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/2504-165-0x00007FFC3FF80000-0x00007FFC3FF98000-memory.dmp

                                      Filesize

                                      96KB

                                    • memory/2504-180-0x00007FFC3B5D0000-0x00007FFC3B5EB000-memory.dmp

                                      Filesize

                                      108KB

                                    • memory/2504-188-0x00007FFC26FE0000-0x00007FFC26FF2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2504-174-0x000002530F030000-0x00000253100E0000-memory.dmp

                                      Filesize

                                      16.7MB

                                    • memory/2504-187-0x00007FFC27470000-0x00007FFC274C7000-memory.dmp

                                      Filesize

                                      348KB

                                    • memory/2504-186-0x00007FFC3B540000-0x00007FFC3B551000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/2504-185-0x00007FFC3AAD0000-0x00007FFC3AB4C000-memory.dmp

                                      Filesize

                                      496KB

                                    • memory/2504-184-0x00007FFC3B440000-0x00007FFC3B4A7000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/2504-183-0x00007FFC3B560000-0x00007FFC3B590000-memory.dmp

                                      Filesize

                                      192KB

                                    • memory/2504-182-0x00007FFC3B590000-0x00007FFC3B5A8000-memory.dmp

                                      Filesize

                                      96KB

                                    • memory/2504-181-0x00007FFC3B5B0000-0x00007FFC3B5C1000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/4360-19-0x0000000000400000-0x0000000000457000-memory.dmp

                                      Filesize

                                      348KB

                                    • memory/4360-13-0x0000000000AF0000-0x0000000000BF0000-memory.dmp

                                      Filesize

                                      1024KB

                                    • memory/4360-14-0x0000000002690000-0x00000000026DB000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/4360-15-0x0000000000400000-0x0000000000457000-memory.dmp

                                      Filesize

                                      348KB

                                    • memory/4360-16-0x0000000000AF0000-0x0000000000BF0000-memory.dmp

                                      Filesize

                                      1024KB

                                    • memory/4360-18-0x0000000002690000-0x00000000026DB000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/4360-17-0x0000000000400000-0x0000000000848000-memory.dmp

                                      Filesize

                                      4.3MB