Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-01-2025 15:17

General

  • Target

    @#Pa$$w0rD__9095--PC_Set-Uᴘ#.7z

  • Size

    7.3MB

  • MD5

    15457cc77438808b2272d5ac665522d8

  • SHA1

    deffeee6099b51e2b768458ffe6123c0aade5287

  • SHA256

    a133bb958667271b103dbaf75078dae059b78fdc44034e415e3e0a0d5e8fed44

  • SHA512

    fffff168a4c1ff4ca6b8a36312c6a00e7af51e6c952abc0c80ade3eeb0477ccacf2eaaf86ac232f94438603812416a4bc39720bcae03565cd26ff0b3c01399fe

  • SSDEEP

    196608:3P0eE5K0JIRTMsoO0k8pzf7RBdDPcpdeXZyCGWgbi:3PQK22Ms30kY7tBVPcrKKti

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 4 IoCs
  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\@#Pa$$w0rD__9095--PC_Set-Uᴘ#.7z"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\AppData\Local\Temp\7zO8B37CAA7\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO8B37CAA7\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c move Crystal Crystal.cmd & Crystal.cmd
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3108
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4868
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3060
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1112
        • C:\Windows\SysWOW64\findstr.exe
          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3632
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 397775
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4208
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Baghdad
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3416
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "mount" Movers
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2064
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 397775\Bristol.com + Special + Blog + Webshots + Responding + Structured + Municipal + Webster + Finished + Advertiser 397775\Bristol.com
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2868
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Buf + ..\Adventure + ..\Nuclear + ..\Yemen + ..\Moss + ..\Ton r
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2768
        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\397775\Bristol.com
          Bristol.com r
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3284
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3032
    • C:\Users\Admin\AppData\Local\Temp\7zO8B3CEDF7\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO8B3CEDF7\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:776
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c move Crystal Crystal.cmd & Crystal.cmd
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4272
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2168
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2244
        • C:\Windows\SysWOW64\findstr.exe
          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1508
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 397775
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2016
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Baghdad
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2776
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 397775\Bristol.com + Special + Blog + Webshots + Responding + Structured + Municipal + Webster + Finished + Advertiser 397775\Bristol.com
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1016
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Buf + ..\Adventure + ..\Nuclear + ..\Yemen + ..\Moss + ..\Ton r
          4⤵
          • System Location Discovery: System Language Discovery
          PID:384
        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\397775\Bristol.com
          Bristol.com r
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1892
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\397775\Bristol.com

    Filesize

    1KB

    MD5

    772f49b5009184af63be07be1ce3a4bc

    SHA1

    db7326edccbcd587ba25538d1bac4953d476b53a

    SHA256

    03f28c5c40709d57f882f80bc67c1ba29762cf38c150eabda66c4928e29315fa

    SHA512

    62e1b7c11e1497b83740773e699f18438b3bbb0cc4c73dc6ef342ced647f705a5f378b0f23d433ef5db38f3c38ac76fa3b78372ebef8703a986ac22c9278b16e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\397775\Bristol.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\397775\r

    Filesize

    450KB

    MD5

    2e76ab11511574d46bfd976a52f8e00b

    SHA1

    627a8e8c5058eb28965f383634a257178adc90f5

    SHA256

    70cda9eae425c30f94ece02dd190ee95441e8715e0b4af922ef331f48925451e

    SHA512

    535525ffcad1746a6985c5fb8f1a6c5a1dd0d10a0d6e8a8ff19366bbcedfaa66b81811696e59392a2ecf9a0250008605f6e00add61d8f18b94c881912dc85dec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Adventure

    Filesize

    87KB

    MD5

    c27215e7b68dc107322dc39c5604e848

    SHA1

    0bbdba0c0c937af82fc70ba4f5dcb1882ba0ed2b

    SHA256

    262040eaa462db2dba237232292229759da45e7e161e4799223d81577be726e8

    SHA512

    4ec5dd0b246df3c6230ba152721e0b4d5fef64655490a06c1fac60e620681702d971e9a63c6782498ebd590ce4caa686db86c0b1e12c01a68ab3ef2b43fe703a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Advertiser

    Filesize

    10KB

    MD5

    58a3fd733cc7962de67ec72ccd4a7cd9

    SHA1

    fec83c2d9d4f43e874b414f7e140bd03d29121f6

    SHA256

    86136a964a8f34ea0d5801c57917d95ed6462fa699ee7f6ffa83321899693a6a

    SHA512

    743cdd49452b165c4c526a9d3c361400e85f55568b8810f0a8d9a950105c4201098724a49f2827617af0c9a1afaa5f583ad87c00f840ec39ffe6986a872e7634

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Baghdad

    Filesize

    476KB

    MD5

    62f50a17760bbc02779721a0de0a19b9

    SHA1

    00ccb6e26a5e9857645c6e6886088036ae5ea453

    SHA256

    918ae6cb87535b7f7e638a71999b6f943e78d11e5c1cabfb3d30ac2ad29c0b85

    SHA512

    3eaaf03a540b9fef6b6ef9319108dd5506ec0b5173e50c7c82e773871d4823b89ffe65fea5210d8ff9c8199bd08b9c6eeb0c97172e8bc17c6971f838be980e7c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Blog

    Filesize

    109KB

    MD5

    86f171cf0507098747e20b04be524684

    SHA1

    7732ac26f1ad3fb0eb51154fc3641ac03581e457

    SHA256

    1197c2e29ca69f0ccf5f9f1556dbcd998fc47fa7296870e97065cd0bd97256c7

    SHA512

    f39f32a2ff7a9de8f08d287048c644c4b83d8a494af3414d66b0c8531de7b58454a95e93211af2a7671549d805d0f94cf29966f8c5f9b8622754f19f625ece58

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Buf

    Filesize

    58KB

    MD5

    2ad6f2a8b39a60e499301d66b83845bb

    SHA1

    11434d4351fac4e8871dccd12e297b62973c02b2

    SHA256

    3ebf00a2fdc82f1267a9da2f6acbfcdcbfe708c0f9a00aada3aa9e74c9f0c02e

    SHA512

    7d539908258a5a4bd22852fbb15ea5b9501b9d3ac5453a5f1b50e49fdaf629ca4bc253c1a4a966d6667300c55b2525c29f2163e00c4623d333d59c51f46f861c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Crystal

    Filesize

    26KB

    MD5

    df04ef8cc784688df1e3375954ab969e

    SHA1

    2ff6942ff20b8ddefbaad9082ea04de3a295961d

    SHA256

    642217eb1317ff35faf4fa46569bf2aff93cb1dd8ef8cdd7413568d36381b4b9

    SHA512

    a85720a6f3958625b0fe6230b984c5c2f7a6f1a109901e8af31e2381605dc050210f11bb9a979cf99b68a0dd87eb437b96ac4afb4253ec31e77dcda366e082de

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Finished

    Filesize

    146KB

    MD5

    b236327f58d3564d0682a555bd3279e2

    SHA1

    c90b2de85486a680ace01c2dedadcbe41bfa7fc8

    SHA256

    e30591f437183affce8d85e8e9dd8d1e8ae10635b6651c1948486fbb76045821

    SHA512

    8d24745475b243a2a4e87928463c36690ae3f8a653aab9226900cfbebd941209e4866046c8c45a7eea73daba46693faaec4bb0b84413ff7e73a0502a093bf317

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Moss

    Filesize

    84KB

    MD5

    f940cf30209cc25420eb3b93106cba8b

    SHA1

    524a7842ea24a659ab0170c75c60fcfcd87827e5

    SHA256

    04edb60ab9b1afccb2045a4e07dc1e562db2c400c462afb70856d0123ca92251

    SHA512

    35c5fa8fa87cce223198c7d3e9136586aeaf6170657f925dc2b365edee9f042966f22afcc0977c0af445605c11a4b877db5c5d8500a3344f5b9429f783070390

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Movers

    Filesize

    1KB

    MD5

    9f4ba3a32a86f157c248352737b49dcc

    SHA1

    b028b7de56298d17444108896eeb903cc5383b58

    SHA256

    1ab9540091c5a6a6300fc0cf6eeaed8fcd0a7c1170746879fa708b586492fd0b

    SHA512

    111d07e0c74a75adbb90c702603059e9a360fb28e461d1147d8cacd315e6b7cb29aaed20cb356453dc1cbcf9c2e1330db0a5738f6a088293780ffb6788d23d1c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Municipal

    Filesize

    97KB

    MD5

    868f3882ecb20c6ecea13e315387dbf6

    SHA1

    fee3e381ea4cece0d9e9203542863944470f1e39

    SHA256

    52c78005d284a566189e7ced8caadf9f783a1f7dbb335419ca23a0507ef9ce97

    SHA512

    2f56518069253e0db9c7b9b89b5c48b9403879c7342dd951c6065d5a0320b2c4b41162217389df66f0ad2c689fe24abfbeb7b91caca627908d2c8965970640b6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Nuclear

    Filesize

    96KB

    MD5

    675e584477135bff44d2e6f6b85816ee

    SHA1

    1d7fa71018328ef0513cc7e78670184fe989f36d

    SHA256

    d3a13e3925d4133b3846f079f6da5404216c45198f72fc79dbd2ef8d5ef84615

    SHA512

    da6d26a92170e15fc03972a8cbfae8110b362d4d3d437e8e411162c9489036c7311de6dab5699c858767ea0afe5ac07b57890509136bc1541047f9bfdd703226

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Responding

    Filesize

    92KB

    MD5

    bfbe5130a231ca99c6f621e86a1f5c11

    SHA1

    d1c8fb40a61cad6b32d7d45d5c6aea8b0588d859

    SHA256

    7610d06f05cbd9a9e42dd8c280eebef7b0153acd0e4d4c1e2e47a093434fd7f7

    SHA512

    1e61216d30bd644182c6bf641d8c1c8866c6174d1d01432eb06685451b6dee0b32053e1a691ff6b56c145613c818e970b34413ad1df773e5669ec66e077de8d2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Special

    Filesize

    105KB

    MD5

    27e0c2c173ebc3430f3b2fee543ba5c3

    SHA1

    4034cc171f6e30a6c4362eb483cd36a50f3e37a8

    SHA256

    91a800d84be69848da633a2c2fcedd966d9d803f0f7c07327726ea1c7e6119fd

    SHA512

    ab65ce1514312d42819cf848a4eeba213d1e0f3abbbb5df4f8e4b9fc4615895d7cdcf11662b7576af5dfd4e53b4ccded2356c7a74f6a57f11cc2a4d0e938eaaf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Structured

    Filesize

    80KB

    MD5

    868e90073acbe393b692904ff23b980d

    SHA1

    1cb9fc36b356e2de44e95d32a471c2f47dcb2fe8

    SHA256

    85485dc3a6b18d0cdab4553d893b90197d5fefa71522153afbdb007b755b4b0f

    SHA512

    96a08b0a933ddf85f8d615a234f1ed658d38dda6fbe4c256a49f07d9b3d2bc99bbf0f6607631f48eb541726ebea96150bde4c2b3fb505211e6c986701fc12cae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ton

    Filesize

    43KB

    MD5

    49533e2c34da0edee56c8ce81c80d8ec

    SHA1

    9883a0dd2abaa7d0fe13036fba87fc45290f674c

    SHA256

    3b3df54176dc31c067730a5e44ce77bee8261f39ff7fe5403b3b9b7661528f75

    SHA512

    dbe99e693bf19b6f604262d31b413f3240614bebdb5f69e589a4bc90d0350ff439d82fe2b0139115805bba0341cc5855e803959870024b5714dfcb683fcf565a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Webshots

    Filesize

    143KB

    MD5

    10d542a4003680de0f1471c70c00d32f

    SHA1

    83749f6319de3b13a224f42e1d3988b4f77a7f88

    SHA256

    1c7436560d8b1971d9d045cfb245c4b2e726f7f1b4cbd1d2603788c842941ea3

    SHA512

    eaea52f5a86ed478d7c14402d7c811564f06e458287848842ef0bd8c48cdacb5c6d62aee420d054a23f042bfe93dbf2d7fdfc2eadb000cbf87f25b49d76a4ab5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Webster

    Filesize

    142KB

    MD5

    ba230b0f8012dd732db2a05b4377f8fc

    SHA1

    859edc66cb34e7ac30e72390c8ea56aea85b650e

    SHA256

    4f29b5da6b92f97d8ec079dbcf129a29c84a846d27656dad0fcfeb7552cdeaad

    SHA512

    d0cdd5e414a1e8c6d8dd9b01cf73b8edbe2e5dc5b0b61b3de66924682ac8797b7e25e87c6df2c77a7d59f5cf68049477d1089acacafa90134bdebecfb9b4147f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Yemen

    Filesize

    82KB

    MD5

    0bce76d72ed5ceb79fc869a930c33605

    SHA1

    41936072484509754ad946d4d98eaa03feeaebd2

    SHA256

    52ffc6820b9155838c598ebba3f70927a794ea5f9777102be062cac5abf943be

    SHA512

    7cb83bbb2c90a3434a81a1678288bea74dd8961fe1d96ab35c1b8fbaf099a1a6b76089275cbe274b85e6c9e53849d98a99de246355453b11b1e8fdf8ef69ba1e

  • C:\Users\Admin\AppData\Local\Temp\7zO8B37CAA7\Setup.exe

    Filesize

    1018KB

    MD5

    a596f60ba9cc2f9b9330f54cc84791fa

    SHA1

    e518cee3fff729bd1769b23d1c50494d05745731

    SHA256

    9e27421ddecb5d76e0d6c914352bb8d9d31e1c57ecdbece7abd384f0fb78ed8d

    SHA512

    f05a363bcc6db812ff3e95b8ec570fb365d5988330298a5d4b4e22038cce65e668ee8178425e0b67f8e92974ba0ddaa99c7ce53ac467be0ebe3ccaaee6d2b886

  • memory/3284-134-0x0000000000260000-0x00000000002B6000-memory.dmp

    Filesize

    344KB

  • memory/3284-133-0x0000000000260000-0x00000000002B6000-memory.dmp

    Filesize

    344KB

  • memory/3284-132-0x0000000000260000-0x00000000002B6000-memory.dmp

    Filesize

    344KB

  • memory/3284-136-0x0000000000260000-0x00000000002B6000-memory.dmp

    Filesize

    344KB

  • memory/3284-135-0x0000000000260000-0x00000000002B6000-memory.dmp

    Filesize

    344KB