Analysis

  • max time kernel
    71s
  • max time network
    76s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 21:23

General

  • Target

    V1.56.zip

  • Size

    37.0MB

  • MD5

    8d5342e25d8d524b9e90b0f9d969fa10

  • SHA1

    068610998e8c9c9f8d891726612e9c182ccac552

  • SHA256

    c4ef59b78f973b8e7b6ea4a38fcb47b6fb89f313655561a45a8e902bc35916c6

  • SHA512

    24542b6d084b3c5ec1e03b4c7c91d5b14712b5157a20a5348f1bab4c8fec15cbc89ecbc6079baf617488236d9356bacb079d9329138dda9b92a6302d1353e3b8

  • SSDEEP

    786432:3OIDCHF6vramPmGgnIs0Q8UKfLD87hwzkBnQo1YQw/:+Ymku3vIs07UK387KzCQorw/

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\V1.56.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1392
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4252
    • C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe
      "C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe"
      1⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe\""
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3568
      • C:\Windows\System32\Wbem\wmic.exe
        wmic csproduct get uuid
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4088
      • C:\ProgramData\driver1.exe
        C:\ProgramData\driver1.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\driver1.exe

      Filesize

      751KB

      MD5

      3214d278389b00b8bb5f5b40fb0f934f

      SHA1

      26a59dfcff0af7e52973c09529975ac20fe924ea

      SHA256

      c4fb768cfe399783fc55ca4a37af7bc2ac606f85c50f6be3c0c04dd2098149f3

      SHA512

      849aeef01d4e2dd1c0be3584e123e33bb3923d9c01e9881cc1fb00df9d472ed19d6da10c64e2a04a6b73693bffc290d983b22db106619421a6266569836eb1ef

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      cadef9abd087803c630df65264a6c81c

      SHA1

      babbf3636c347c8727c35f3eef2ee643dbcc4bd2

      SHA256

      cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

      SHA512

      7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mjoga2lg.oxd.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\gdi32.dll

      Filesize

      440KB

      MD5

      a82792c042704d82902e2515d5b03bd7

      SHA1

      ca0c8ed87ee501060a11045ec5e8919805c7ed80

      SHA256

      144560c1b24c2a2eee2d17b7ea7bc11371e340339bffe67e7a26c0a66d8d9a74

      SHA512

      af7870c8029f6b703fb37c4e041c725f1b4e9c3116e2b8b316a1b75bbd7589ca72d8ec249017ea0d5a84701591c7f360629536bb1c52238fc96f755a449f9b63

    • memory/2780-55-0x0000000000EF0000-0x0000000000F57000-memory.dmp

      Filesize

      412KB

    • memory/2780-59-0x0000000000EF0000-0x0000000000F57000-memory.dmp

      Filesize

      412KB

    • memory/2780-56-0x0000000000EF0000-0x0000000000F57000-memory.dmp

      Filesize

      412KB

    • memory/3032-47-0x0000000000A10000-0x0000000000AD6000-memory.dmp

      Filesize

      792KB

    • memory/3032-48-0x0000000005500000-0x0000000005506000-memory.dmp

      Filesize

      24KB

    • memory/3172-25-0x0000029253230000-0x0000029253252000-memory.dmp

      Filesize

      136KB