Analysis

  • max time kernel
    94s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 02:14

General

  • Target

    639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620.exe

  • Size

    815KB

  • MD5

    51648584ffb4a6398eb1cef4da20e457

  • SHA1

    74f2facfc001a0b4f23b8d4ce24208aa0c5f84e2

  • SHA256

    639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620

  • SHA512

    c77036be9e73e12b43f02fd48dbe4f49469f0a21baf83bf23d43bb6678a52e4702cacaa05baeb189e10726ce1d5797b67d3bf8f98844632c04913ec3df46acfa

  • SSDEEP

    24576:5B2uFkvh/nrd8NhhG5idard8NhhG5idct:5B2lneh8eaeh8e0

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://fancywaxxers.shop/api

Extracted

Family

lumma

C2

https://fancywaxxers.shop/api

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620.exe
    "C:\Users\Admin\AppData\Local\Temp\639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620.exe
      "C:\Users\Admin\AppData\Local\Temp\639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1080-1-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/1080-3-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/1080-4-0x0000000000840000-0x0000000000910000-memory.dmp

    Filesize

    832KB

  • memory/1692-0-0x0000000000870000-0x0000000000871000-memory.dmp

    Filesize

    4KB