Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 13:29

General

  • Target

    8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe

  • Size

    605KB

  • MD5

    2816f592a20b55ac30849a92e6d61c00

  • SHA1

    46eb22835a28b154dbf700416094ce22f8ff65f6

  • SHA256

    8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12

  • SHA512

    137c0cadf443a2525a710ea394f06312a4993eb1bb29db66f1e0a12778b68b8e370befd30702c7c465bf960d0361d264ec186dd12f2e2407adebc5508658334e

  • SSDEEP

    12288:xvu/lxRkPqQBY0+B/7hmrOA1xO2nuhPxjnp:xvWJx7hmrOA3OLhPxjn

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://spellshagey.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e8be57740fd43058b3e310c77c9ffda477e62f729550030d38a9afe9bdddf12N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gdi32.dll

    Filesize

    594KB

    MD5

    0a3568081bc0723afa5f7d8edd48cab2

    SHA1

    7be9930c4ef3a0ccc03a6b1610ebc39c539b3fc0

    SHA256

    0954e49a50df01d9e50b19f0db627c965eb66fb51b1355b2309af3d1db0b7e92

    SHA512

    31150e53b3842602d909e1503e32c42a731acf6d7df476ffbb7468ace291c4f9d337d6a5cf1ab732b55ad76f09d7d40d85c54d134484ae9b2782a5436284d8ee

  • memory/1160-8-0x00000000006F0000-0x0000000000754000-memory.dmp

    Filesize

    400KB

  • memory/1160-12-0x00000000006F0000-0x0000000000754000-memory.dmp

    Filesize

    400KB

  • memory/1160-15-0x00000000006F0000-0x0000000000754000-memory.dmp

    Filesize

    400KB

  • memory/3552-0-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

    Filesize

    4KB

  • memory/3552-1-0x0000000000220000-0x00000000002BE000-memory.dmp

    Filesize

    632KB

  • memory/3552-17-0x0000000074D60000-0x0000000075510000-memory.dmp

    Filesize

    7.7MB