Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2024, 05:30

General

  • Target

    623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe

  • Size

    1.9MB

  • MD5

    ef949464dd8dc945ca3d997d2a1f5d49

  • SHA1

    c68400fb4f02c0cd9ee27760931fefe7a1d3764e

  • SHA256

    623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778

  • SHA512

    781e0765988976ebea95e479032b2d072d1aec59f692f1ed0d04c773af567d69e4e53e110153c0e9f8fe566747bcb090ba38a3656eddaca25a0c310a3456da11

  • SSDEEP

    49152:+pz3IaXn7fXnAXD0TVbTGkJWCI16GwE9NPPV:+pTXn7PAYx7QCwwEHV

Score
10/10

Malware Config

Extracted

Family

lumma

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe
    "C:\Users\Admin\AppData\Local\Temp\623897df28c316d90bb0946128ee6a4a9fe9776307787f1de12c3b078b338778.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\vmhost.exe
      "C:\Users\Admin\AppData\Local\Temp\vmhost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Users\Admin\AppData\Roaming\Signconfig_v2\vmhost.exe
        C:\Users\Admin\AppData\Roaming\Signconfig_v2\vmhost.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\646a59d6

    Filesize

    1023KB

    MD5

    7f987323249d0ee0dbf5d67883482ec1

    SHA1

    ad6acbcecccfd90474abb9775e7be77aeaa030e7

    SHA256

    7dde714630ea2aed576636e1eb0ec0f5babcd11b96ed898c714e725fe5efaebd

    SHA512

    b144fa46f33162f9047a1f8126817b9b8d316a859472df2451ffdb65bff330624e4959ddff34255822bd64e3098de717fb00dbe7b153df6f8761148cce71331b

  • C:\Users\Admin\AppData\Local\Temp\Cab6FD5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6FF7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\carcinogen.vhd

    Filesize

    46KB

    MD5

    76c9fbe132f5201921277a48b50cb4fb

    SHA1

    702b8ed137bdc8504e04badd36e6ad49db060132

    SHA256

    8bf0e15ab214313e35d3971ad736758d2f44bf68f758670ae5e6bf755a011568

    SHA512

    2db057415e2e2f864be3b14883a51f876eac10d60e6c4bb50a96faf9bec143610e1dd50a42753ef37222df92d0252b8b6057b7c5e566a99782f04739bd1d7b8b

  • C:\Users\Admin\AppData\Local\Temp\glib-2.0.dll

    Filesize

    1.0MB

    MD5

    1170e6f21225a2182942042074efd5aa

    SHA1

    dabeb2af2dfeda137fcb82d48e2c4915b9d0f452

    SHA256

    8394a39d0234dbc6eb765378691865d3146150a994d9c8f7b4a495d861e11f19

    SHA512

    8e57cc90ab8a9c4b6bac6d77660d8f31fa12ae23fe2bb91cfd3765368574c98b886f4a554910a4c7e41ad846f3a394e7baa79715a5b614baf88e10ae76bb076c

  • C:\Users\Admin\AppData\Local\Temp\iconv.dll

    Filesize

    1.1MB

    MD5

    862dfc9bf209a46d6f4874614a6631cc

    SHA1

    43216aae64df217cba009145b6f9ad5b97fe927a

    SHA256

    84538f1aacebf9daad9fdb856611ab3d98a6d71c9ec79a8250eee694d2652a8b

    SHA512

    b0611cd9ad441871cca62291913197257660390fa4ea8a26cb41dc343a8a27ae111762de40c6f50cae3e365d8891500fc6ad0571aa3cd3a77eb83d9d488d19a8

  • C:\Users\Admin\AppData\Local\Temp\intl.dll

    Filesize

    87KB

    MD5

    d1a21e38593fddba8e51ed6bf7acf404

    SHA1

    759f16325f0920933ac977909b7fe261e0e129e6

    SHA256

    6a64c9cb0904ed48ce0d5cda137fcfd6dd463d84681436ca647b195aa2038a7e

    SHA512

    3f4390603cd68d949eb938c1599503fb1cbb1b8250638e0985fad2f40f08d5e45ea4a8c149e44a50c6aa9077054387c48f71b53bf06b713ca1e73a3d5a6a6c2e

  • C:\Users\Admin\AppData\Local\Temp\nineteen.rpm

    Filesize

    783KB

    MD5

    710f1fe566827ca4abff9060d3fbc969

    SHA1

    cd25136ab3c9f16c0d502c4e0d02b7d749708ce3

    SHA256

    fe44bbd482a270808f7d2d25d26ab891c79ed1a0cd1bbfca0620b351e324d74b

    SHA512

    1e4e31d554f31ae8581a897f81ba4be4076ae336af7af79de63ac8756478756fca92a0ec5bbcb494b00d0e772bbbe6d83d7f20aad5f1fca5fb0b2bbd826b235f

  • C:\Users\Admin\AppData\Local\Temp\vmtools.dll

    Filesize

    617KB

    MD5

    65c3c2a741838474a592679cda346753

    SHA1

    043d80766dd4e49d8dca6ac72b04e09b5491fdc9

    SHA256

    4e5f2c54d9ecfe48999edfcce0de038948f8b20ff68e299c55d9a2d6f65713e8

    SHA512

    e5d8b308586ffa914f46b6766217eb12ad759853d25108db06170b870d0e8947e2befabc2843f76cb864b0f0135a8f2163b7c93fe644b293789919d1d07c4079

  • \Users\Admin\AppData\Local\Temp\hgfs.dll

    Filesize

    89KB

    MD5

    87c333cde9cd60e42abe42d588f15ab4

    SHA1

    23f800dfd6676e8258a5667cb510e7fa1abea137

    SHA256

    ce4f43fd49011c402a52c5472a1eca574edfa6c2982da8a0e7d54e57d62d9323

    SHA512

    d3e59ff737b7f408a00e53bc368a1bc878a623a4ec949729307aa9c5fccf993568972188f7d9c069476b95833a38f42f87d500cf17dc710088d108fe68252fd5

  • \Users\Admin\AppData\Local\Temp\vmhost.exe

    Filesize

    77KB

    MD5

    659dbfb6cad2836899bcb2c17cc5411a

    SHA1

    f2e070ae58d9938abc88003a7e60dc5a4b33da56

    SHA256

    132e2aaf6ba22738d79a027f967b865154f427eb5aa9c623dd4a2e9c0656e279

    SHA512

    1625917a16e434451d468c851e8310e0c683edc08f434369e047a47868b14d80930181ab4cd101e287174b8442449336f27369403a929b7c33fbee3cae7b5ed6

  • memory/2212-35-0x00000000741C0000-0x0000000074334000-memory.dmp

    Filesize

    1.5MB

  • memory/2212-36-0x00000000770D0000-0x0000000077279000-memory.dmp

    Filesize

    1.7MB

  • memory/2212-29-0x00000000004F0000-0x0000000000604000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-71-0x00000000770D0000-0x0000000077279000-memory.dmp

    Filesize

    1.7MB

  • memory/2708-72-0x0000000074340000-0x00000000744B4000-memory.dmp

    Filesize

    1.5MB

  • memory/2788-64-0x0000000074340000-0x00000000744B4000-memory.dmp

    Filesize

    1.5MB

  • memory/2788-68-0x0000000074340000-0x00000000744B4000-memory.dmp

    Filesize

    1.5MB

  • memory/2788-66-0x0000000074353000-0x0000000074355000-memory.dmp

    Filesize

    8KB

  • memory/2788-67-0x0000000074340000-0x00000000744B4000-memory.dmp

    Filesize

    1.5MB

  • memory/2788-65-0x00000000770D0000-0x0000000077279000-memory.dmp

    Filesize

    1.7MB

  • memory/2788-58-0x0000000000330000-0x0000000000444000-memory.dmp

    Filesize

    1.1MB

  • memory/2896-74-0x00000000770D0000-0x0000000077279000-memory.dmp

    Filesize

    1.7MB

  • memory/2896-75-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2896-76-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2896-77-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB