Overview
overview
10Static
static
7frhasdtr.exe
windows7-x64
10frhasdtr.exe
windows10-2004-x64
10lumma.exe
windows7-x64
10lumma.exe
windows10-2004-x64
10picturefonts.exe
windows7-x64
7picturefonts.exe
windows10-2004-x64
7rundll.exe
windows7-x64
1rundll.exe
windows10-2004-x64
10setup.exe
windows7-x64
7setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
92s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 03:37
Behavioral task
behavioral1
Sample
frhasdtr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
frhasdtr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lumma.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
lumma.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
picturefonts.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
picturefonts.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
rundll.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
rundll.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
setup.exe
Resource
win7-20240708-en
General
-
Target
lumma.exe
-
Size
6.3MB
-
MD5
68821531a37ba7822fd5d67019733b6b
-
SHA1
b53de7324804e2775d46f2ec9a56627d706eb647
-
SHA256
39551af6337d3dca0ed2212e19e7b6648c8d4fca343c61a27e415602f321ceba
-
SHA512
5e249f08aa91641c00f43fff22b6d5d8c714a5b3e8ffe4dbaa8b223c5c65588cd0e821e3b98297cd638096c5b1c768099b5c8b9c368cefc951248adf1cf1616c
-
SSDEEP
196608:6qwtqwlk+lDCjExVbXZlL8UBk8Ocp0J89voSPn0:ik+aExVbJhbfYq0
Malware Config
Extracted
lumma
https://commisionipwn.shop/api
https://stitchmiscpaew.shop/api
https://ignoracndwko.shop/api
https://grassemenwji.shop/api
https://charistmatwio.shop/api
https://basedsymsotp.shop/api
https://complainnykso.shop/api
https://preachstrwnwjw.shop/api
Signatures
-
Lumma family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation lumma.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation clamer.exe -
Executes dropped EXE 2 IoCs
pid Process 4632 clamer.exe 4560 frhasdtr.exe -
resource yara_rule behavioral4/files/0x000b000000023b84-14.dat vmprotect behavioral4/memory/4560-20-0x0000000000500000-0x0000000000DF6000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frhasdtr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4560 frhasdtr.exe 4560 frhasdtr.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 744 wrote to memory of 2604 744 lumma.exe 83 PID 744 wrote to memory of 2604 744 lumma.exe 83 PID 2604 wrote to memory of 4632 2604 cmd.exe 86 PID 2604 wrote to memory of 4632 2604 cmd.exe 86 PID 4632 wrote to memory of 4560 4632 clamer.exe 87 PID 4632 wrote to memory of 4560 4632 clamer.exe 87 PID 4632 wrote to memory of 4560 4632 clamer.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\lumma.exe"C:\Users\Admin\AppData\Local\Temp\lumma.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.execlamer.exe -pfrhasdtr3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\frhasdtr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\frhasdtr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38B
MD5628aae5750fc0020d95684ea374583b9
SHA1ae262990bc7394d7cf077d9b0f15c1c0dc298c41
SHA25615df98664ca3de71fc6e1a9909fb26daffb3f5efd8c09369156afd0b06329cba
SHA512b3c2ddc2d7f083c8be05e9248f0ecc23d803ca7058c8333cc23028f018894e2b9bf92cdddf7d4c8407b81793ccbfce27e58a8ae5216e2ea97c1d69e3ec8323bb
-
Filesize
5.9MB
MD54f18d47ea8490cfcf59c3eaf9c5dbf68
SHA184738b3ba9c1a188f67abef3da841d90b206dfb9
SHA256f52de5c2436b99920092bfb639045ec409104a770b8b40e2bd6ba577e01c04e8
SHA5128d85915ed3b9a442e152dcab0216609770d090b5f579e756ec3c9917fc7fe1d52bedb190ad21043d70cbefcb45ceeba4d595f97ac664a6ea670ba56b1b772d9e
-
Filesize
5.5MB
MD5f6c0f0e730b0dccf2dfbd2bca9afd415
SHA18c930bc6004a3dafb7eb8d86b16ab5a59fa5e94a
SHA2561d43e78596a3bdede8c56902959b4f2b08ca7f75200d22f44812b5f216631d5b
SHA512d2864e6465583289d1ba771ad7c34d66c62d79e00c1549ce058df958aed12cf973242482616d0f7a2f79f44eae30271c8a0d3e0a7c2d4baa27ecf06938069c1d