Resubmissions

03-01-2025 03:28

250103-d1d8psxnfz 10

03-01-2025 00:59

250103-bcehfsspgt 10

03-01-2025 00:10

250103-agetcatrhp 10

02-01-2025 23:44

250102-3rc2qazphs 10

02-01-2025 23:34

250102-3khcvstjeq 10

02-01-2025 19:18

250102-xz8wgavphj 10

02-01-2025 04:32

250102-e57aqawlem 10

02-01-2025 04:20

250102-eybkgavrej 10

02-01-2025 04:14

250102-etyt7svpgq 10

02-01-2025 03:52

250102-efgnrstrgl 10

Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-01-2025 19:18

General

  • Target

    Setup.exe

  • Size

    800.0MB

  • MD5

    b4d4d19863fd8b7b64e2e8a1204aac62

  • SHA1

    64d1609b82e6054af14412a92724d8605b7d015d

  • SHA256

    56375ce34ece830c6770d768f1ed501a78c359a380c9576274dbbd19c9ef5aa3

  • SHA512

    e00fa8b5af32b334849e499f5f0be5a23aeb37ab2b28d2bf82cee2766d85c3fb1a874cd327467ebdd57475b2b42befb7507d2d6ac923020964e23f0a3f5a7bff

  • SSDEEP

    24576:KjatNrAGDrHrmxAztbD6Lf5aytZI9FmLaQWnnZp/fh+AR9wLsS9qB3Hcxx1VmLHA:PUGnHRbEau4FmUZpYARuISsV+VmLHRQl

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://abruptyopsn.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Elderly Elderly.cmd & Elderly.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3036
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3812
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3672
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5036
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 833075
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4764
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Knights
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4792
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "COMMUNITIES" Expiration
        3⤵
        • System Location Discovery: System Language Discovery
        PID:776
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 833075\Auditor.com + Teacher + Belkin + Streams + Urls + Reunion + Le + Auctions + Suburban + Lotus + Cio 833075\Auditor.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4412
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Die + ..\Folding + ..\Compete + ..\Bukkake + ..\Newer + ..\Common + ..\Relying c
        3⤵
        • System Location Discovery: System Language Discovery
        PID:228
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\833075\Auditor.com
        Auditor.com c
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1052
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2056
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4400
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c move Elderly Elderly.cmd & Elderly.cmd
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4704
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1116
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:5112
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1232
        • C:\Windows\SysWOW64\findstr.exe
          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4028
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 833075
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2252
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Knights
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3800
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 833075\Auditor.com + Teacher + Belkin + Streams + Urls + Reunion + Le + Auctions + Suburban + Lotus + Cio 833075\Auditor.com
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1660
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Die + ..\Folding + ..\Compete + ..\Bukkake + ..\Newer + ..\Common + ..\Relying c
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3724
        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\833075\Auditor.com
          Auditor.com c
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:424
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\833075\Auditor.com

      Filesize

      1KB

      MD5

      95799d47b08d0a83c2315ff39e062787

      SHA1

      9ea6ed4fe71050d9ca599f9c237f4659bc2e4e44

      SHA256

      cbe7febb2b721f7468e69f91832b2fce3fb464b6196a7fa5aea40cd3704aa8ce

      SHA512

      21734937fcbf39c25269779f188a451a7aae1da3c116403f8c0cfa312c865937fa1df44e982e1891a5fc91af6253f259d62ca5b97db1a60752f0b9708ca48853

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\833075\Auditor.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\833075\c

      Filesize

      471KB

      MD5

      c16f1f2ddd12c58877c0403595ebc291

      SHA1

      81a9dfff63aa34b20f335cde358eec06b4d6ba42

      SHA256

      d9f559ca6c3b4302b70851a95c3fe1bda2ab040b669f2665d6116b3f535ecd4e

      SHA512

      7b01fd23ab0f07fa13decfe44130b02ff298c237b897db4697fc4383635e3da3deab5bbf70deec68712db29ef76f1c7af21d5ff1fceb9290c23bc6dd76930d45

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Auctions

      Filesize

      59KB

      MD5

      4f989fe2288df507824795891db37ad3

      SHA1

      04d1c1e8b73e7505cda1ee59ff334c9e4f90c98d

      SHA256

      5c9fd76e22bc14be1a78ce29eaf0c7ab3dfd202c90d00af713db269215fc9705

      SHA512

      16fa0ccd15f2c7fe41af7ca8e75b0336412e1150a12b927b1f8bc14abc3179a34a60340b530046880c63c9aa54c968bf1b9540cbe6d79248981caf7ca1a49d40

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Belkin

      Filesize

      87KB

      MD5

      4a74fe9a414178e272a121e0aefb4fde

      SHA1

      61cff1e2e68f659fa655353155fe8e688dcd52e2

      SHA256

      a6f85ed9eaf661638dac027224afcc4435be462c1102eb84ad3557b362b5b027

      SHA512

      94bd356a202d4d27a946a7131b8de9c05a7ff11f2c7ead65381ed2550f2014cda1ac27004041c5181a62ea68f67a051b1312cdfca013b93b8bda9c0295f40430

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Bukkake

      Filesize

      62KB

      MD5

      a853f8ba23ee9006672430226faa209d

      SHA1

      e5819c98ab22d6821551e8ed79c094bf4abbadd3

      SHA256

      ebcd770dd258f448ffc4ae24ef89100e8b0f320d0299e64589c91b4ed23bde73

      SHA512

      bff70b15f1a6ae193bc85b1fe6c5e64bb24ea2136fd9f18fdc8292cba1bfb02c371593dceb80fde5708d061697c37632799ccd8c0784899cb0e8a716e805b000

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cio

      Filesize

      14KB

      MD5

      8bb1164f4f404739f54cd316c8e8b36d

      SHA1

      655244bf3b18ce2f4fb36c0e8880fc8df91f75f1

      SHA256

      89e6c32c015562cbbee1f2845baf10cf0050c4b0d03922b7118c14267a12d098

      SHA512

      fda9a87c772c0fe932bb20d1e4c793e18c2412993b1948dc210bdab1a09e565fdc16887897386b46449c2b9854f9aff24610ee892b2a33ebd15ee465e2ce4929

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Common

      Filesize

      62KB

      MD5

      3343bab5952bde5f6e5f5e0aeffbfaa0

      SHA1

      190de1b9591fdf2a6efc81d101c4cfc10357216c

      SHA256

      3476a2a20531ed13d054a62d54edbc1082565ce9cfb97997e14a88c503ef5925

      SHA512

      7863d4da0542994587cc248ba2fc97ac3e4d59ff6eef67b5743f2ed7499ad6440fd1976c081477222eeb99a8e1806424b6f96aa04284a6308972449485d30f4d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Compete

      Filesize

      96KB

      MD5

      ea7349cd6b023cbcb6e7b35e7f743ca3

      SHA1

      33f60bfd3ddb6d06f52ffb6a0b500c8228815e17

      SHA256

      3690cf2a6d0d0764d8900a68684c0681ae1a0be0fe83de235bfe330281c94849

      SHA512

      c21f1e445cfcd19760aa7ab0ff2ad769b6a79657f88b4a280ba8cd8efc211f12a4465f9feefc4475e772f803407ddd586bf075cbc70a3bc37d1be9ccea42a38e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Die

      Filesize

      55KB

      MD5

      e8fd86d8f17e2f3544e3e1fa98d3099c

      SHA1

      31df18ba4beaefccc790465ea9a6977fc362a887

      SHA256

      0986e457bd65e8bd51df4fee0d40121eab968c4695810dd9e3b185cf94e30d4a

      SHA512

      647749daa7cc00d8abd6ff4bf176478ee998dbd0c78931d0f1ddf5e269465c0e7d00f7c7f0005be021bd1694316422a08b48991370d62bb233fd7c5e11186270

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Elderly

      Filesize

      21KB

      MD5

      2b346f7f697da242fbbdd4cac81832f5

      SHA1

      c42977d8b070b85e83a432758486b1d95d26f53f

      SHA256

      6a3af83883e8aede7285e3dec81544a800a0581e8f3200e20c5379e0318208db

      SHA512

      d456fc01413bd33f935919ddb2c2baffc89d88a201cd035198de1cd82993473c9d6594ba489bc5a0d5ca8cd6f699101f8ba58bcf2f476b9a76602d90d9703c99

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Expiration

      Filesize

      1KB

      MD5

      3c2f564f0e6cf845f275c0c260d8e2d7

      SHA1

      cd64eec775ccfcfbf40eac824776e7b916c0096b

      SHA256

      77d4e41b168f50fd0602a36175189fb9824557dac9c8e7d8069ad350ff52a70b

      SHA512

      29b9feaab2f140fd5fe2e3dc1b93fe0550f75d7245a02144eef320b2a56df5b2e49bbb8368d63fe9cb7a4cd4821959c3f1a5dbc172bd75dcd2551f79d1e66716

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Folding

      Filesize

      74KB

      MD5

      3eb6148b77b49e7e5d666f6735c3e4e0

      SHA1

      080bce92426eb4784ebfa7ce49740cf9e5666c06

      SHA256

      a715dd8459669aac579b6f5dcf0eb41348d6f5f72696a51dce56e524f9cf3715

      SHA512

      ab9476c117864d20c326cbde4398b4df7631181e5de41e266693adcad40ea7462b31376fed556feb272f4d88c63b31e0a67e708ac6b809601e4d473e7bcf1976

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Knights

      Filesize

      477KB

      MD5

      c51929f6b56df082636303912abefccc

      SHA1

      fc9b0adc28d41c69628ca6c8d5f6faffd59bb801

      SHA256

      c6d95cccaf4295a357fa068f16094307252c0cbaeb0e07ed77d8c22ae7021066

      SHA512

      d05422d3c7e2b5ebfde8f906a8229d9f74c390da3dba2f692c76c49e76be3d92e8139f1227bd0b8f82a6c1da637a7f306fec47c8d98047cd813d973d72bb04a7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Le

      Filesize

      55KB

      MD5

      54faecf50af8404b2420efc817866573

      SHA1

      99bd647c28703db2f2bc2b477bf4406de6ae4bdb

      SHA256

      7590140370bf630a10c5efc54170d737f33c30c8934d88d0613b6a3c03949a39

      SHA512

      e2709e435653a561794a25a17b8210ca3e383199ed9b9e016dab76cdd3bc80898bf14a76ee69b5ad2d9e71b79cefda78f20fc717c0b7afa20911847c5170dbc6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Lotus

      Filesize

      129KB

      MD5

      12b3dc27d331d7fcc10fbe2b079cd7c2

      SHA1

      b8c0ac1b928aa153f5787f096f9ba49a0ce6d3bf

      SHA256

      c1dc610ae31e6897175be00530632ba1aa78f690f7ad4d80d92f9b97c0d613f0

      SHA512

      3ce8054ec9c4b85e2bda8feb7b822a02c1c43736252f47916916fceb52ba675dcd2ca9cff59403a50eda1eb5d95ae87a66c591933fdb07b1b979b3365b6764c1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Newer

      Filesize

      89KB

      MD5

      f3c461d3382ca719ed889794a105969a

      SHA1

      9f809658408b124da902b5f9ec804e63959d3115

      SHA256

      a135bad5fd34c8daf8e37f7991d50b250c4c52fb1eb8188a022161c0f3860050

      SHA512

      4a74f6f5d89a44b2929a5d625fa3963916f3b15a5073c98b20f5ab69422b12aeb7bec40d711e440f538812438869254ec7cf323b0c2e9331f04e47e50f92fe30

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Relying

      Filesize

      33KB

      MD5

      85710221e954089fe03a7e0a36d37961

      SHA1

      4661d6e6206d5568341e42531cf425efbe260a70

      SHA256

      672e5aab02ffd641ba59de12ab059bcb1b9d13c96497d993d1de241b8fc23911

      SHA512

      3c348b4c455990ebc5f7cd9736f8b467245f4d8e57846d5c0ba6509615c9c1207493f1947c4a86c0beb78d4d09fad5a166fde73be42c0a3d7565aefd064c6e9a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Reunion

      Filesize

      99KB

      MD5

      23f57f85b7751c2aa5e2bcf14b7a71ba

      SHA1

      c2f1ebd04828e5283bf1f16b0a2be345fbfc9afb

      SHA256

      c1f4c250e2ec3bca004a576fc0bb2406c6969cd987d9dbd384353536ce7c30af

      SHA512

      38ad408585127d28eb5e77a3089f0db00cf792d30f67b7ef260093a63f36f0ffef20ef8cee6fd4961ddd8543baa738602c3a337b74ed7f2ebbbffde84bd5d799

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Streams

      Filesize

      136KB

      MD5

      c809040cbe80646e91bfd8ac5b14b5ce

      SHA1

      60f9672e2a347d9c8f544e7ffd1ff5092a09de69

      SHA256

      5cf443b3b203b24e54693b6d8d1542573c26df58db51078e5b9f8c0bd3f11f4a

      SHA512

      06bf7dc5d1eea9b3f75f544ee32ca21e6a9c64ea0c5b60ea355e117ab836037e557d3beefa2cd3ab9996cd20ee1d8d0459b687950c74e8a7da182707542a7110

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Suburban

      Filesize

      118KB

      MD5

      d5604fd884b523a093525077b879e755

      SHA1

      9da375a5441c7387231fc4f0368858cba1922880

      SHA256

      e251d31724ca24a174ee34b140adcf03120532931c7efe59a56283d79b58001f

      SHA512

      d5f0d895f25d445cd6711ff6e9502af7e6ab7a08ca7bd0cb49a1bf556f14e081d42d200fe4202d9923f5b7b7abc43388f902dde9cc10f16e259652aa06c1b598

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Teacher

      Filesize

      96KB

      MD5

      72878bb5088e9d99d1a1595bff6bbbb1

      SHA1

      edf4f87d2e866f86c4456f626052cb486a742bbb

      SHA256

      f7bc585dc9221cd5bdaae306b55391c0736ffe0bae9414a1545d2d2b1663c860

      SHA512

      793c261032a8d6f90f119de6f1bc28f6b64809b8ff66b39db704f2bfda463b90f6238b9289cfa1dcc143e21c7e13be61c205a9282ffcceaf38ffc696cc4b3103

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Urls

      Filesize

      130KB

      MD5

      d8d7e8a8e845dfd84628cfcb956161db

      SHA1

      04385cfccbacfda98a50cbc3e6d2eec3243faaa2

      SHA256

      d56964936063f21b78a588bc18d0cd790591962bbb6017fc8044eda3acbb84ae

      SHA512

      184516d98bfd5494bcd23940f422c13dd269646ce5398db468925d7c513639a35604cfcba135e0430383615ab93e52ad5882a56dc7649a2ea26e9ce6e2de65b9

    • memory/1052-70-0x0000000004390000-0x00000000043E5000-memory.dmp

      Filesize

      340KB

    • memory/1052-72-0x0000000004390000-0x00000000043E5000-memory.dmp

      Filesize

      340KB

    • memory/1052-71-0x0000000004390000-0x00000000043E5000-memory.dmp

      Filesize

      340KB

    • memory/1052-74-0x0000000004390000-0x00000000043E5000-memory.dmp

      Filesize

      340KB

    • memory/1052-73-0x0000000004390000-0x00000000043E5000-memory.dmp

      Filesize

      340KB