Analysis

  • max time kernel
    92s
  • max time network
    203s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-01-2025 00:19

General

  • Target

    fd4cd0668aa23ea85fcc25ff8328e8d1018965ba9ec754818b6677f03abb0f24.exe

  • Size

    323KB

  • MD5

    11ef4960441f5dd1dbe8c137fccd43a2

  • SHA1

    6d522e053fba22694184a82e43e74e8752e214b4

  • SHA256

    fd4cd0668aa23ea85fcc25ff8328e8d1018965ba9ec754818b6677f03abb0f24

  • SHA512

    d0a593882e63f21686fb71644599652a1d3a8b0cb8e46b3b5a50d1abdad5353d2c5dd748453122cf389f1d2dcbf392b8ebfb3253791875ef4c051e6c35454bc9

  • SSDEEP

    6144:+dFOWFLblRGGbx3WK45CLbrMQzo+IWzgxj2VJ:+dFFFvlRGyxGK45C7Mz+IKJ

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://spellshagey.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd4cd0668aa23ea85fcc25ff8328e8d1018965ba9ec754818b6677f03abb0f24.exe
    "C:\Users\Admin\AppData\Local\Temp\fd4cd0668aa23ea85fcc25ff8328e8d1018965ba9ec754818b6677f03abb0f24.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2632
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 1360
      2⤵
      • Program crash
      PID:1368
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2632 -ip 2632
    1⤵
      PID:1532
    • C:\Windows\system32\BackgroundTransferHost.exe
      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
      1⤵
      • Modifies registry class
      PID:4392
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2328

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\5e8aa5fd-ec5a-4671-b21b-0d26f76519da.down_data

        Filesize

        555KB

        MD5

        5683c0028832cae4ef93ca39c8ac5029

        SHA1

        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

        SHA256

        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

        SHA512

        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

      • memory/2632-0-0x0000000000730000-0x000000000075C000-memory.dmp

        Filesize

        176KB

      • memory/2632-1-0x0000000002300000-0x000000000234B000-memory.dmp

        Filesize

        300KB

      • memory/2632-2-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/2632-3-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/2632-4-0x0000000000730000-0x000000000075C000-memory.dmp

        Filesize

        176KB

      • memory/2632-5-0x0000000002300000-0x000000000234B000-memory.dmp

        Filesize

        300KB