Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 13:29

General

  • Target

    8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe

  • Size

    605KB

  • MD5

    2816f592a20b55ac30849a92e6d61c00

  • SHA1

    46eb22835a28b154dbf700416094ce22f8ff65f6

  • SHA256

    8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12

  • SHA512

    137c0cadf443a2525a710ea394f06312a4993eb1bb29db66f1e0a12778b68b8e370befd30702c7c465bf960d0361d264ec186dd12f2e2407adebc5508658334e

  • SSDEEP

    12288:xvu/lxRkPqQBY0+B/7hmrOA1xO2nuhPxjnp:xvWJx7hmrOA3OLhPxjn

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://spellshagey.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\gdi32.dll

    Filesize

    594KB

    MD5

    0a3568081bc0723afa5f7d8edd48cab2

    SHA1

    7be9930c4ef3a0ccc03a6b1610ebc39c539b3fc0

    SHA256

    0954e49a50df01d9e50b19f0db627c965eb66fb51b1355b2309af3d1db0b7e92

    SHA512

    31150e53b3842602d909e1503e32c42a731acf6d7df476ffbb7468ace291c4f9d337d6a5cf1ab732b55ad76f09d7d40d85c54d134484ae9b2782a5436284d8ee

  • memory/2368-0-0x00000000749BE000-0x00000000749BF000-memory.dmp

    Filesize

    4KB

  • memory/2368-1-0x0000000000050000-0x00000000000EE000-memory.dmp

    Filesize

    632KB

  • memory/2368-6-0x00000000749B0000-0x000000007509E000-memory.dmp

    Filesize

    6.9MB