Analysis

  • max time kernel
    93s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2024, 22:36

General

  • Target

    R3nz_Loader.exe

  • Size

    689KB

  • MD5

    b43d8eca7777b170ddc40a824ab10bb6

  • SHA1

    a7da0bbde621a7df3489b394ee4e5cea963225e6

  • SHA256

    1db1a4c253278293c863dff9759c6577f1b6b5b8f69ac0c612338453eeea96d9

  • SHA512

    54c6ec0681b7e67782c4d142450f84bef5129c4cfa4dfbd70edc63bd3385d8cc9277cdfbcf2c3a8f6c5cb49b9252eb8c46984a65164164886b805e084e6bbb55

  • SSDEEP

    12288:ENvwXTkEVI9HBoDWupxGsFITxLmIJpCbp4/MLq/xgtQS7iBDgCL+ZNNzloh3LouP:ENoXQEV2hozxG0c0bp2Y4oQSW

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://fancywaxxers.shop/api

Extracted

Family

lumma

C2

https://fancywaxxers.shop/api

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\R3nz_Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\R3nz_Loader.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 1028
      2⤵
      • Program crash
      PID:2816
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 692 -ip 692
    1⤵
      PID:5092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\gdi32.dll

      Filesize

      433KB

      MD5

      747539cefb1ef3c38ad756a2f5305097

      SHA1

      6f5ce5b9d430931164e4b3e57df4c98ea0f82c34

      SHA256

      05512ca3a16e8d0fb965de8f20e9a9f0b046f3d3384d89d767c4d875182bda3f

      SHA512

      4a9934bd7a2f8bfec4ddfa0a7e9d24dbdfcee864163804d9b3b726ab16209f1de43a3cbd3e003531758c5c2a68ac21549c3a4df7b6ee1e373d9a0dd8c1f209c6

    • memory/692-0-0x0000000074ECE000-0x0000000074ECF000-memory.dmp

      Filesize

      4KB

    • memory/692-1-0x00000000008C0000-0x0000000000976000-memory.dmp

      Filesize

      728KB

    • memory/692-2-0x0000000005250000-0x0000000005256000-memory.dmp

      Filesize

      24KB

    • memory/692-9-0x0000000074EC0000-0x0000000075670000-memory.dmp

      Filesize

      7.7MB

    • memory/692-18-0x0000000074EC0000-0x0000000075670000-memory.dmp

      Filesize

      7.7MB

    • memory/692-19-0x0000000074EC0000-0x0000000075670000-memory.dmp

      Filesize

      7.7MB

    • memory/3728-14-0x0000000000D30000-0x0000000000D96000-memory.dmp

      Filesize

      408KB

    • memory/3728-10-0x0000000000D30000-0x0000000000D96000-memory.dmp

      Filesize

      408KB

    • memory/3728-17-0x0000000000D30000-0x0000000000D96000-memory.dmp

      Filesize

      408KB