Analysis

  • max time kernel
    154s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 03:37

General

  • Target

    FieroHack.exe

  • Size

    841.6MB

  • MD5

    9722d2c34d0ec7171331183c43bc8ea1

  • SHA1

    cdea5a07278bd60e905782b9a55b28544bb2123b

  • SHA256

    f1dae00c68bf6d4b583bad5812d0776ea3abfaacc3876439f078caa3584455c8

  • SHA512

    e9b96afb6012fb037aaa3a8563a7f57b2e57e4e4e5111c10e9aa2e69181196594198ad320950d57bc265e9b2ac733fe7749cb738645ceab1e14ca49e132d2225

  • SSDEEP

    98304:zSYl+O1E/Uo8EoT9AfvDm+CIUzwNhpVCrQ:zS7Uo/bfyhIUziIrQ

Malware Config

Extracted

Family

lumma

C2

https://preside-comforter.sbs/api

https://savvy-steereo.sbs/api

https://copper-replace.sbs/api

https://record-envyp.sbs/api

https://slam-whipp.sbs/api

https://wrench-creter.sbs/api

https://looky-marked.sbs/api

https://plastic-mitten.sbs/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 4 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FieroHack.exe
    "C:\Users\Admin\AppData\Local\Temp\FieroHack.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Users\Admin\AppData\Roaming\WeMod.exe
      C:\Users\Admin\AppData\Roaming\WeMod.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4072
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1516
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4396
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          4⤵
            PID:3420
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:1384
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:4508
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop wuauserv
          3⤵
          • Launches sc.exe
          PID:2064
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop bits
          3⤵
          • Launches sc.exe
          PID:2368
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop dosvc
          3⤵
          • Launches sc.exe
          PID:5012
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:4840
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:4472
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:4216
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:4960
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe delete "WHAMNXEF"
          3⤵
          • Launches sc.exe
          PID:3492
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe create "WHAMNXEF" binpath= "C:\ProgramData\jlspkeimqrvm\blvsiwuhlygz.exe" start= "auto"
          3⤵
          • Launches sc.exe
          PID:4592
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop eventlog
          3⤵
          • Launches sc.exe
          PID:3936
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe start "WHAMNXEF"
          3⤵
          • Launches sc.exe
          PID:2616
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Roaming\WeMod.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Windows\system32\choice.exe
            choice /C Y /N /D Y /T 3
            4⤵
              PID:4176
        • C:\Users\Admin\AppData\Roaming\Sirus.exe
          C:\Users\Admin\AppData\Roaming\Sirus.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Users\Admin\AppData\Roaming\Sirus.exe
            "C:\Users\Admin\AppData\Roaming\Sirus.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1768
      • C:\ProgramData\jlspkeimqrvm\blvsiwuhlygz.exe
        C:\ProgramData\jlspkeimqrvm\blvsiwuhlygz.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4604
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3404
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1004
          • C:\Windows\system32\wusa.exe
            wusa /uninstall /kb:890830 /quiet /norestart
            3⤵
              PID:5064
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop UsoSvc
            2⤵
            • Launches sc.exe
            PID:4340
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop WaaSMedicSvc
            2⤵
            • Launches sc.exe
            PID:1776
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop wuauserv
            2⤵
            • Launches sc.exe
            PID:4248
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop bits
            2⤵
            • Launches sc.exe
            PID:4180
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop dosvc
            2⤵
            • Launches sc.exe
            PID:2876
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:2072
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:3628
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:1696
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:5084
          • C:\Windows\system32\conhost.exe
            C:\Windows\system32\conhost.exe
            2⤵
              PID:3248
            • C:\Windows\explorer.exe
              explorer.exe
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4936

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b0nwrhqe.g4d.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/1516-37-0x000001853C070000-0x000001853C092000-memory.dmp

            Filesize

            136KB

          • memory/1768-27-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/1768-32-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/1768-31-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/1768-30-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/3248-97-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/3248-98-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/3248-99-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/3248-100-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/3248-101-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/3248-104-0x0000000140000000-0x000000014000E000-memory.dmp

            Filesize

            56KB

          • memory/3404-87-0x000001DDFBA60000-0x000001DDFBB15000-memory.dmp

            Filesize

            724KB

          • memory/3404-91-0x000001DDFBCD0000-0x000001DDFBCEA000-memory.dmp

            Filesize

            104KB

          • memory/3404-94-0x000001DDFBCC0000-0x000001DDFBCCA000-memory.dmp

            Filesize

            40KB

          • memory/3404-92-0x000001DDFBC80000-0x000001DDFBC88000-memory.dmp

            Filesize

            32KB

          • memory/3404-90-0x000001DDFBC70000-0x000001DDFBC7A000-memory.dmp

            Filesize

            40KB

          • memory/3404-89-0x000001DDFBC90000-0x000001DDFBCAC000-memory.dmp

            Filesize

            112KB

          • memory/3404-88-0x000001DDFBB20000-0x000001DDFBB2A000-memory.dmp

            Filesize

            40KB

          • memory/3404-86-0x000001DDFBA40000-0x000001DDFBA5C000-memory.dmp

            Filesize

            112KB

          • memory/3404-93-0x000001DDFBCB0000-0x000001DDFBCB6000-memory.dmp

            Filesize

            24KB

          • memory/4072-11-0x00007FF7E9980000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            5.3MB

          • memory/4072-9-0x00007FF7E9980000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            5.3MB

          • memory/4072-52-0x00007FFA4AC90000-0x00007FFA4AF59000-memory.dmp

            Filesize

            2.8MB

          • memory/4072-51-0x00007FFA4D1D0000-0x00007FFA4D3C5000-memory.dmp

            Filesize

            2.0MB

          • memory/4072-50-0x00007FF7E9980000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            5.3MB

          • memory/4072-26-0x00007FF7E9C11000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            2.7MB

          • memory/4072-6-0x00007FF7E9C11000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            2.7MB

          • memory/4072-7-0x00007FF7E9980000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            5.3MB

          • memory/4072-10-0x00007FF7E9980000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            5.3MB

          • memory/4072-53-0x00007FFA4BE10000-0x00007FFA4BEAE000-memory.dmp

            Filesize

            632KB

          • memory/4072-12-0x000001CE782C0000-0x000001CE7831F000-memory.dmp

            Filesize

            380KB

          • memory/4072-17-0x000001CE78910000-0x000001CE78911000-memory.dmp

            Filesize

            4KB

          • memory/4072-16-0x00007FFA4BE10000-0x00007FFA4BEAE000-memory.dmp

            Filesize

            632KB

          • memory/4072-36-0x00007FFA4BE10000-0x00007FFA4BEAE000-memory.dmp

            Filesize

            632KB

          • memory/4072-5-0x00007FF7E9980000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            5.3MB

          • memory/4072-33-0x00007FF7E9980000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            5.3MB

          • memory/4072-22-0x00007FFA4BE10000-0x00007FFA4BEAE000-memory.dmp

            Filesize

            632KB

          • memory/4072-21-0x00007FFA4AC90000-0x00007FFA4AF59000-memory.dmp

            Filesize

            2.8MB

          • memory/4072-20-0x00007FFA4D1D0000-0x00007FFA4D3C5000-memory.dmp

            Filesize

            2.0MB

          • memory/4072-19-0x00007FF7E9980000-0x00007FF7E9EC5000-memory.dmp

            Filesize

            5.3MB

          • memory/4604-57-0x00007FF6CFFB0000-0x00007FF6D04F5000-memory.dmp

            Filesize

            5.3MB

          • memory/4604-116-0x00007FF6CFFB0000-0x00007FF6D04F5000-memory.dmp

            Filesize

            5.3MB

          • memory/4604-61-0x00007FF6CFFB0000-0x00007FF6D04F5000-memory.dmp

            Filesize

            5.3MB

          • memory/4604-66-0x00007FFA4BE10000-0x00007FFA4BEAE000-memory.dmp

            Filesize

            632KB

          • memory/4604-60-0x00007FF6CFFB0000-0x00007FF6D04F5000-memory.dmp

            Filesize

            5.3MB

          • memory/4604-58-0x00007FF6CFFB0000-0x00007FF6D04F5000-memory.dmp

            Filesize

            5.3MB

          • memory/4604-56-0x00007FF6CFFB0000-0x00007FF6D04F5000-memory.dmp

            Filesize

            5.3MB

          • memory/4604-59-0x00007FF6CFFB0000-0x00007FF6D04F5000-memory.dmp

            Filesize

            5.3MB

          • memory/4604-62-0x000001BADD740000-0x000001BADD79F000-memory.dmp

            Filesize

            380KB

          • memory/4604-114-0x00007FFA4AC90000-0x00007FFA4AF59000-memory.dmp

            Filesize

            2.8MB

          • memory/4604-113-0x00007FFA4D1D0000-0x00007FFA4D3C5000-memory.dmp

            Filesize

            2.0MB

          • memory/4604-115-0x00007FFA4BE10000-0x00007FFA4BEAE000-memory.dmp

            Filesize

            632KB

          • memory/4936-121-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-118-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-117-0x0000000001000000-0x0000000001020000-memory.dmp

            Filesize

            128KB

          • memory/4936-107-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-111-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-110-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-105-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-109-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-122-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-119-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-120-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-108-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-106-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-123-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB

          • memory/4936-124-0x0000000140000000-0x0000000140835000-memory.dmp

            Filesize

            8.2MB