Analysis

  • max time kernel
    123s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 16:02

General

  • Target

    appFile.exe

  • Size

    819.2MB

  • MD5

    4fcc72c433dddb6c3458ff947f423c10

  • SHA1

    8469e0b7b8ce20ff0721676097b9e1d20e1eb2ef

  • SHA256

    3bfa35907c5a97cd0d26478f3afd84286bf7655ce27adf245a83eb10cd70307c

  • SHA512

    896b5257818ba053c07d1061d24d82aa79046b902d8f79ce38a4a72617fed476dfc856c93a466713f9df2e09b3d56e3a4bc33ec1984f92a5d6529f1738518270

  • SSDEEP

    196608:1cfuoGxnRoht78USnoSfgPSulo5Ud3334MznYNRXgXq+e5wXlFYcpwEYEa7QMDJt:+fthfSnPqwhMty9T5ZHO24+72ceyf

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\appFile.exe
    "C:\Users\Admin\AppData\Local\Temp\appFile.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Mb Mb.cmd & Mb.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2876
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2932
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2676
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 155766
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2816
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Hypothetical
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2836
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "homework" Defend
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2636
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 155766\Altered.com + Priorities + Cohen + Rejected + Leaving + Aging + Game + System + Computation + Immediately + Realm 155766\Altered.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2364
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Anime + ..\Ips + ..\Cheapest + ..\Client + ..\Po + ..\Charts + ..\Room f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2588
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\155766\Altered.com
        Altered.com f
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1612
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\155766\Altered.com

    Filesize

    750B

    MD5

    d277248f80190d058128a858718253a5

    SHA1

    178195030df7752f5de8731fdf4fd24cda1ea048

    SHA256

    9de1c0df49d674e6d652e4a343db861dc5741aaa70e9c58d8b7458e01d4f56b4

    SHA512

    a00d75074a2c6cc654c0fb35641e5a2d4ea78ae2dc7fe34fdf09e11fde43c6bfbbcc06e5b190eea1f419215dee3e3d36e3efcd8b886d94b97ad2e86cb88a0935

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\155766\Altered.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\155766\f

    Filesize

    457KB

    MD5

    8a67bbb41b9b2e0221d9f9f070c918d9

    SHA1

    468f81784f29cf871a8087deec134037efd242a7

    SHA256

    3f24f4b4ccf6d2296da98d7590c375dca509288377de1b8480dbceeb43df3043

    SHA512

    f9f38aee8692888a5d7e1f12029e5c8a24566abf3b6008fee81197ec3096dee43587c937f13e0710dab13a0dc51e7957b85605030e63c605251e4a51d3808201

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Aging

    Filesize

    75KB

    MD5

    2d2d0d734b48b8d8c14fdf2abaec2d69

    SHA1

    52ee9a63c6d9e571ee26b7ece95f21c80f38df63

    SHA256

    3d1f64bbf0a343513b9dca1a98b509b0b92270e86df42b79c59e9ca7b1271743

    SHA512

    12702a7d7d9fa04ae01777b44b6a908e50bf9396782f44d14545bac4da293bef9af219bd4b7e9a2e65adb253dfeda9030b88087c120dae4625f7d61924471932

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Anime

    Filesize

    78KB

    MD5

    2e19ce72fc33ab1e1b6c4cd764af0378

    SHA1

    8abfb9bf1a9d63029855e6d52a5e1b76f9c72764

    SHA256

    9f7a13744e14f486ee561c4c49bb3f603afe7afbe30793c53dd53af46836e528

    SHA512

    d64edfa8a0b313f2e63f0ef1b1f813cd8aed0d4f6ed33c50ba0dceacfb72eb74d4588c8b706d087d8d79d461f02b2c20a8259ddc62449abc3f829d873a7776fe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Charts

    Filesize

    85KB

    MD5

    f3eaa547ffbe381ab6dcc093234473f2

    SHA1

    65f3161d35940828c02b8a7db1aa4f19b0804f60

    SHA256

    9ad773f199e969571442c06c11df4ec09d5f4f268046d885e049420cc08fb220

    SHA512

    c14aa630ebf1e388d72d1affb502a959c6a454477bcbfa478418aed8e88e3e99846a9f29a7aa1252c0869bc4afe46dee5a6a04cfcb778dbc251d1c40d34af61d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cheapest

    Filesize

    56KB

    MD5

    d0faccc354d82f80956b525cde65b5f9

    SHA1

    0a77239d63633c1baf1ea1c5d73d83e3cedb10cf

    SHA256

    892da9dac2a2dd04bcac005750a7a1da773baca6a25c1fbf51af2ce41c59252c

    SHA512

    2162dd8b4ad1b28482f8701b6362b7da40fc937594d08ee0e1343f5223331b0de9cc89f903ccfc92bc4e319649ac073f050d31cc7c04990aacda0b7f1cac76e7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Client

    Filesize

    68KB

    MD5

    dff8e9b2fc908f3ba33e096b4f35e626

    SHA1

    dd120ad25b0b1892a70846018d23fd156330e3e7

    SHA256

    296c6c7acb2e87ee0082bddab82c5395030b5214832da7685d44860cef6d96c9

    SHA512

    abc5721e2276137f53d4f9042493defd70a021bd451b15fe8bcd1d5712982610fc3821ddb5212e3cae2b2af214ce394b5d2750a23c07cf1e040f736d6448c91f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cohen

    Filesize

    133KB

    MD5

    9b6654bdee2dca21441bd0b196a6b198

    SHA1

    54a28022fc8e63f5340a65e372da2cd9ff1215ca

    SHA256

    e55c39a69f0b9d923a6ed9d3f05495f632a8cafa89abadd173e4f3badc513490

    SHA512

    49ffe1263e4439d05bd133357dabfc7940dff59bc006b730e9e9115b8492e8fbf47188edba2b6fc78598076b5f57a673e6cfcb70db837e2ffac26cb6767f28bb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Computation

    Filesize

    109KB

    MD5

    7e03c7e02c79f1b2e9fcc0dbd15a046b

    SHA1

    47c1b880b4920d27a10403644ef2590339685042

    SHA256

    6e0780ef4ff73842d41465ef93b90a06c1af0e1821de5868e7f955e914494ae9

    SHA512

    4978b26135749b077846175fd74d947e7c9c64eabc80fe3191430c4188c7b1ef4c4a0a8292ca8c17a25bc568a67286f7b34f0c7d3cb3337227636f1a98b7b685

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Defend

    Filesize

    758B

    MD5

    2813fd04e4b6f011537b206cc75d49d1

    SHA1

    d94c080e2aead4761acc1dc942179bc188263581

    SHA256

    15d4c801ac2708fae3657a0e2b177e537f67530336e9a81ffb60a5e97d32afde

    SHA512

    b29f807a8f0dbb91ba9506aa7e29a34ed51e38820b7d9b10ff157956327bd8034bab1746037824103fe752114ed913c3558eefe2101b43e5402f5339eb5342fd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Game

    Filesize

    99KB

    MD5

    740dcff59cce5d4474008dc8860576b9

    SHA1

    cd549817fb35aa52a36a8ad4b85db179dec86aee

    SHA256

    a9fb448c5a154077f2aa903a010bbb69213c7e5ca614ac92685bc4160dff5dd6

    SHA512

    9a616ffa6cb1465ac722b225551c2815b3db0efd578da18691bb64c08d293b76eb048cd743746a3cb2231433ea700a84dbcf1626cf25447f2158b78ad2967c7e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Hypothetical

    Filesize

    476KB

    MD5

    6a90032c3087da0c6c5cd4e26faa130a

    SHA1

    01c303a210d2358815b9bd80a8db03654e443d5e

    SHA256

    1fe850eb734c06f7f6275f543e66da757798efd85438ec44f257752cad0a844a

    SHA512

    929109607a664a76b9be329e31c54b5005c024b4fa9bb2ecb76777578af000d01878cba4575596af0661458bdeb3f5589b66b361d5c1e45986a3e22027f24e80

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Immediately

    Filesize

    71KB

    MD5

    d6fd801778c7900546c3e7fc650d5c37

    SHA1

    3b4b40332a55caad44f35cdedeedf8739d4235fb

    SHA256

    21de6e001ad0fd9e7f197c87087703ab507ab80940dbccbdc64866e6217ff289

    SHA512

    3ae1673fa8ba7937d13efb81de2cc7a6f7f804fa9f200d8280859a75806d2623ce15fad6ac8ecd44d4a95a3a24bca98778a52c07292a70ee382df6609267a0be

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ips

    Filesize

    96KB

    MD5

    7314b029ea8ba2b0fd4888f0160d65aa

    SHA1

    2b6bf44bf4f65dc9e73ed9ed7777bf6266b802e8

    SHA256

    9f5a2b00865b79179fa92a2052e416f66af15ad969ca8d0082daee4c4054435e

    SHA512

    f6c5d890ca7560f7debf488894f41d6b1473e5e0a0df5e7bc586de684184eeb9c97462652d9dd5fb198afd256eb4236e9d747ec25ec981dcf8cc668708d2e626

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Leaving

    Filesize

    72KB

    MD5

    d3c5dd24f7ad544272d5747152e799a1

    SHA1

    b22262d67fc3135d43bcc5fa53b165761d3d944e

    SHA256

    294b6ee9e9486df87f5945ec34bd6605f03ee201fe6f4535b12c413b6263afe7

    SHA512

    b9a132fb9c7355a3c0213410c1d5969c470daeb39e154181f76def68b900de660b9bbfd82df474f4bc3e81e21acae0a0cf7974f1c5fb2fe3fd479902b2b02509

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mb

    Filesize

    26KB

    MD5

    c593366e1cfcd643e75b566ec386caf7

    SHA1

    f9b22698e9a5115d020ff7c9490e388127837d27

    SHA256

    b42a8dfc65980c281016ea1d2f7a9b6c79bd2de660e2dc65a9c2ccdc91253bde

    SHA512

    165489199629eacdfbf0c1ab09b69de4a04bb9b1d682ec6f8e05910aae638cd17ce4541d1fa346a11f451c63f8370c3e7a68d3bf4160f40f2f8085cf48ab0c47

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Po

    Filesize

    51KB

    MD5

    a4cb14af2fe7cbddd269e8ccbe9eba81

    SHA1

    88555646770e70ced0c883463df324b4ec70d028

    SHA256

    560b476dc3790c8e2f5b509c488ea6a86e700ac19fcaf904178462ff3efcf98e

    SHA512

    871cdb1002a6acd13f151689d5578aad70316c2a3834aeb8cc37add349539cccde4741ac91eda5261e5890f357f1c1c3d6e5bd51b24be4c88cd7df542b0ee31d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Priorities

    Filesize

    126KB

    MD5

    69a4f06d648eafc7cc54b6290eaa0bc7

    SHA1

    84585a3b86aca8642b5b929ad8cc80057c6dbd27

    SHA256

    8b638187baa22eb1b3532050af50817171fc0ffc805bf2d6a7da7e666385d148

    SHA512

    ec649e724749f614bb23edddae2e4746e35e13d761964169ff40579cf42a049421672f4545cd9758e7430042cacde7349c819dbc04f2f036f4190765e50771e8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Realm

    Filesize

    11KB

    MD5

    2d501e26576c35e22c6ca520ca3f50c4

    SHA1

    f94695ac3a6ed634098f5e7d7b3c26ecd9d91a77

    SHA256

    27a1053a4e6a02d13e8fce0ec03456a921e826e82253b81c354f3426dbb1462b

    SHA512

    79d2e29bb47db6fea5d022b8f344a2004509161aa7587b5112db5cef42988c91efc0077d7903155933c0eb145e42a005976520d36da5f789187b6b6a8202f3b9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Rejected

    Filesize

    87KB

    MD5

    2e89af75610e5a67ff8dcd67d9a2311e

    SHA1

    d9c2f1600ec94105c45b6efd81a4ce8b7a3c8c6a

    SHA256

    49ed44ff870af4c1ed5879efea9e5b85c47ff0b86f5ffeeb682c83630f61c7bd

    SHA512

    b1da7cb625a3b8315707f448e49b312760c55f5dcaf4772fa9a585f57dd229ad740f855375b20e7b2a0aafa02705261915095997f05e1b16b8015008bd4a5631

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Room

    Filesize

    23KB

    MD5

    2ed2df6ad501afb2ec8f1b3d2f817b92

    SHA1

    6820af9f60dcfc99ab82666f0d41c21acdfa9f5b

    SHA256

    a605e2ff4003733f73ff38aac0966f3c3531c5439035d94e99f48e6afbabab9f

    SHA512

    c00a1aebc37f23e917990b14b22730651106fc1ed65a59f6224378e9bcf91a989f2862ba39af424bb4d0e01e472c0f894405c98a01f68854a27a70715ef72369

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\System

    Filesize

    141KB

    MD5

    e127b540b096a89b7420ee8a13e3f062

    SHA1

    7fbb7a24c7b948025d930270c894d4abad818d39

    SHA256

    0cd5bd98b3110ac1e954733e00e0884a0b08351c7540acf41c396a5e38a9d22e

    SHA512

    e35e7ea9b289adeffa7662e2d2b51caabc44ec3fcd4367e94881a4e2f5f76c8a30e59ce56d3848e356fa1c0269d88e6a189f619a3522459784cca0ff63c0d72d

  • C:\Users\Admin\AppData\Local\Temp\Cab5341.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5382.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1612-73-0x0000000003DD0000-0x0000000003E27000-memory.dmp

    Filesize

    348KB

  • memory/1612-72-0x0000000003DD0000-0x0000000003E27000-memory.dmp

    Filesize

    348KB

  • memory/1612-71-0x0000000003DD0000-0x0000000003E27000-memory.dmp

    Filesize

    348KB

  • memory/1612-74-0x0000000003DD0000-0x0000000003E27000-memory.dmp

    Filesize

    348KB

  • memory/1612-75-0x0000000003DD0000-0x0000000003E27000-memory.dmp

    Filesize

    348KB