Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 03:37

General

  • Target

    lumma.exe

  • Size

    6.3MB

  • MD5

    68821531a37ba7822fd5d67019733b6b

  • SHA1

    b53de7324804e2775d46f2ec9a56627d706eb647

  • SHA256

    39551af6337d3dca0ed2212e19e7b6648c8d4fca343c61a27e415602f321ceba

  • SHA512

    5e249f08aa91641c00f43fff22b6d5d8c714a5b3e8ffe4dbaa8b223c5c65588cd0e821e3b98297cd638096c5b1c768099b5c8b9c368cefc951248adf1cf1616c

  • SSDEEP

    196608:6qwtqwlk+lDCjExVbXZlL8UBk8Ocp0J89voSPn0:ik+aExVbJhbfYq0

Malware Config

Extracted

Family

lumma

C2

https://commisionipwn.shop/api

https://stitchmiscpaew.shop/api

https://ignoracndwko.shop/api

https://grassemenwji.shop/api

https://charistmatwio.shop/api

https://basedsymsotp.shop/api

https://complainnykso.shop/api

https://preachstrwnwjw.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lumma.exe
    "C:\Users\Admin\AppData\Local\Temp\lumma.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.exe
        clamer.exe -pfrhasdtr
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\frhasdtr.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\frhasdtr.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab2963.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat

    Filesize

    38B

    MD5

    628aae5750fc0020d95684ea374583b9

    SHA1

    ae262990bc7394d7cf077d9b0f15c1c0dc298c41

    SHA256

    15df98664ca3de71fc6e1a9909fb26daffb3f5efd8c09369156afd0b06329cba

    SHA512

    b3c2ddc2d7f083c8be05e9248f0ecc23d803ca7058c8333cc23028f018894e2b9bf92cdddf7d4c8407b81793ccbfce27e58a8ae5216e2ea97c1d69e3ec8323bb

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\frhasdtr.exe

    Filesize

    5.5MB

    MD5

    f6c0f0e730b0dccf2dfbd2bca9afd415

    SHA1

    8c930bc6004a3dafb7eb8d86b16ab5a59fa5e94a

    SHA256

    1d43e78596a3bdede8c56902959b4f2b08ca7f75200d22f44812b5f216631d5b

    SHA512

    d2864e6465583289d1ba771ad7c34d66c62d79e00c1549ce058df958aed12cf973242482616d0f7a2f79f44eae30271c8a0d3e0a7c2d4baa27ecf06938069c1d

  • C:\Users\Admin\AppData\Local\Temp\Tar2A50.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\RarSFX0\clamer.exe

    Filesize

    5.9MB

    MD5

    4f18d47ea8490cfcf59c3eaf9c5dbf68

    SHA1

    84738b3ba9c1a188f67abef3da841d90b206dfb9

    SHA256

    f52de5c2436b99920092bfb639045ec409104a770b8b40e2bd6ba577e01c04e8

    SHA512

    8d85915ed3b9a442e152dcab0216609770d090b5f579e756ec3c9917fc7fe1d52bedb190ad21043d70cbefcb45ceeba4d595f97ac664a6ea670ba56b1b772d9e

  • memory/2876-40-0x0000000000C00000-0x00000000014F6000-memory.dmp

    Filesize

    9.0MB

  • memory/2876-43-0x0000000000C00000-0x00000000014F6000-memory.dmp

    Filesize

    9.0MB

  • memory/2876-37-0x00000000000E0000-0x00000000000E1000-memory.dmp

    Filesize

    4KB

  • memory/2876-35-0x00000000000E0000-0x00000000000E1000-memory.dmp

    Filesize

    4KB

  • memory/2876-39-0x00000000000E0000-0x00000000000E1000-memory.dmp

    Filesize

    4KB

  • memory/2876-42-0x0000000000C53000-0x0000000000F80000-memory.dmp

    Filesize

    3.2MB

  • memory/2876-78-0x0000000000C00000-0x00000000014F6000-memory.dmp

    Filesize

    9.0MB

  • memory/2876-79-0x0000000000C53000-0x0000000000F80000-memory.dmp

    Filesize

    3.2MB