Analysis

  • max time kernel
    58s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 01:45

General

  • Target

    adobe_illustrator_2025_v29.1_(x64)_pre-cracked.exe

  • Size

    913.1MB

  • MD5

    eb4c3ac3d9e180110caff98bafa7c98e

  • SHA1

    b50b6850f9e7b0312ae89cb1c4ba49d3221604e4

  • SHA256

    5097335b52a0946622914659e078a9a94b8026e71098e2351ec94fbad96d5caa

  • SHA512

    fac63555a92e27b1727b301696138b8182142307d0d0496ce44a70ae68b8042e3cf15ad20835f398ff2dd231d99db1b5b70843a8a6cb752cdb6861aff9674359

  • SSDEEP

    196608:vWjHxUa0MqC6FxRsd3334aDl4SDPpaQHVIyAONxKmfU0mZ+q7GtNzmJnqCm3GLxl:v+RUZfjGDuiIofdURuSnz7BdAkIa

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adobe_illustrator_2025_v29.1_(x64)_pre-cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\adobe_illustrator_2025_v29.1_(x64)_pre-cracked.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Sporting Sporting.cmd & Sporting.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3056
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2932
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:536
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2944
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 254802
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2812
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Dome
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2828
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Tablets" Hb
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2456
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 254802\Breed.com + Dispute + Christianity + Methods + Causing + Myanmar + About + Cakes + Wa + Buttons 254802\Breed.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2324
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Greetings + ..\Providers + ..\Occupation + ..\Holocaust + ..\Deluxe + ..\Jet + ..\Exceptions Z
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2352
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\254802\Breed.com
        Breed.com Z
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:436
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\254802\Breed.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\254802\Z

    Filesize

    436KB

    MD5

    642c411cf8908e1b80e92b096d29bcc9

    SHA1

    0f99185847d7f917094003cb2e3a46f4ab2de496

    SHA256

    1e314e71bda518494cc50d781d5b9d79bd853c2f7cf9d1e3fa4ac59281516475

    SHA512

    784db2fda67f7c944c7bb9ed825152e2e70d117f98d456f9342bbf686875610d80e8caad28cb073a7a91490858357d28fe74b9393f59d862d06fdd5b60509446

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\About

    Filesize

    139KB

    MD5

    57ed4c7e48266628e18a57fcd8e47961

    SHA1

    67b5eaa02d6b31bf930867dd44e2501a0243232f

    SHA256

    38aa7a843ef48d6d36b13a556baeaffe823c8d7f8dcb24ae1253d7331157fde0

    SHA512

    1a18fbfdfbbddfa1822498c83a0130fff9789fa921ea0e84d4d826da277a6f0859ea02182bc0a275a5a2387b5fb54365b8eae7df9fdb05393a297d0246dc1a0b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Buttons

    Filesize

    35KB

    MD5

    f58a9ec64d3d4dba943514acd31243b2

    SHA1

    dfbf020ac779e01b22147e0bbe4d24ca6f3f029c

    SHA256

    400059584d4a78ac9b279d717d7d4ec9f205c1af2cd3613f7dcc100c0dd988cd

    SHA512

    e52b28f61e1e5ecdb88ce8e0aae465956e6a34dc8629c2d82f15805ca84d321b3c1308290f2d846671ae5116b22972f3a541a77bc764ab7e04b502750cb648df

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cakes

    Filesize

    111KB

    MD5

    6a58a62b3f89f7815948746700c20591

    SHA1

    1241a394df91b9528c4147f426b26b86918bb0da

    SHA256

    5a38b90a594fc01e0b4e36cd2a0fe03e0919e8e6fcedb3b918860747c1adadc5

    SHA512

    2449248ea06da06286afe7d81d7eadffe0a3dd77c5c2e506e2a4586c1eb7bf54acbd44607deb642702cc23d2620627cbf9f82a00adde126a963e142a9ea4f854

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Causing

    Filesize

    88KB

    MD5

    e2c9a5f8eadd6b7a33054eaab5a00e72

    SHA1

    c5ac3b626c23c9783885bfbe55ce488d2b333b7e

    SHA256

    b5aa68a8561c45891aba321222825e1e28b973875c3877ec7cd785314d8e2854

    SHA512

    0638d01cdbbb3be8a8eeadade5019f1f49ab549ebd1b580aa745dee14a1cfe241a13b1b3f5a45e7665c8cb552084a63ab59ed211ff8769927d92680370f4bc81

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Christianity

    Filesize

    84KB

    MD5

    ac87a37d8c4623e292bd1650e2eafce0

    SHA1

    3fd339eea4edeab614088c7b9d83530837daea9f

    SHA256

    52701c477cd41c8a09750119d3156616ed517a4496e6481913d681f734340386

    SHA512

    2d943aa7b7bc267fd67dfbf44cc0606e146e7d825bbd64441f19adac36546e4dbd17a9f1187d31d052200409fc6b8cdb03838984f15ff55f7eded5255af4490d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Deluxe

    Filesize

    92KB

    MD5

    4daca48150059aee0ad09fde98eedacf

    SHA1

    3bb1a2deb09eb22b61c2ac23706ad4e9dee88cb2

    SHA256

    97873fadbd36e9b9e41cd8f2f72e5cdc2a5ba2a729c003365a148e292bfb5545

    SHA512

    f1eae3eafade5fea2d51526e1db5b72b91f875d60e31044e2b8e1388e85c1185e734536a0032299c8c0ff70a36ccd0d0479bfe3950b5b069bd6505f722cfe01d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Dispute

    Filesize

    89KB

    MD5

    7dfc7e8b0b66a95aaa5cd46cbeff1813

    SHA1

    124e2efd6534f11aac3392b708748db67c1adaea

    SHA256

    2d220985b7c03b8b86c8886a3048bda666a19070792c149eb7973c2ddc2e7b2d

    SHA512

    3e2c9f1ef4d55fe67eae88e6532c882ab7e66701a2a398036aea6561443dd7b4f8db97648eaf0059aa00dec84f7e5ae509fd6749d9d150cb0fdfa9b7d7c5ca68

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Dome

    Filesize

    478KB

    MD5

    e66a8e8a1190ab4f70cae80ab744cfeb

    SHA1

    76908604d5e4739e8987326f6c38d7689a4485bb

    SHA256

    3b2c2a4a02c799adae00d6be026c5e3c54733d6e8b0a0e51488e3d0f9f0876fb

    SHA512

    3da89fd04275c4069d4eed250043edf6f90ed6ab79453a7f5a7bfa8307f4d6a1b76ccc758b36f9124c8f6361fb571245f4ab4235977b520c2d1fcbe86df7e036

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Exceptions

    Filesize

    6KB

    MD5

    5d2e0aef5363b9722be3691c2d506025

    SHA1

    f82df8e4c6d1d5d59c00241b874496db678bdb25

    SHA256

    3e1370a32f14b94d8b0149936502b4ea0b02896379556dedfd5933807053ba82

    SHA512

    0dcf21a8b1b3f34643cc67624602aebe319dc474894d06abd7abd16164d539b1640d178db3d4906971f743bbb43713a3e28685bbea85c38a520a0288b96d1072

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Greetings

    Filesize

    68KB

    MD5

    a99fe78815fcff0eee64aaf9d95da419

    SHA1

    e67a750d727c374b3003625ecef48d103145f0d4

    SHA256

    468b7e12a558f9f80f0fb222a17311a8baf8eba5d48e48ab215550bb5d9e671b

    SHA512

    5502b6e3464a9c72c5bc05e63195f99e2ded95ed893a1efa6d9108e85c60f3bbf2961f99824c4539356a3be972162e08c71c93cc7644cd4d17f478697c64aec8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Hb

    Filesize

    1KB

    MD5

    fd35a4be23be4db482de37e839c18e5d

    SHA1

    a1535a7214f99c26294248fffd0e2c352c1b617e

    SHA256

    e4c447b8ac2fee6b3304323c5094eb9b3db68828d4dac3fe4b4c30d44a2f5ea8

    SHA512

    a362b36ecfe71d9ec6a1b11386a33e86c6e0c4cbbddee0d68254de1ccea8b00828c02e8388e74f919d6765ef7579c81bc75497f52425bbf6fa6c54f9aa50a432

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Holocaust

    Filesize

    51KB

    MD5

    402681c9785f6549ab89e6d3f618b668

    SHA1

    11ac2e9dd4c94c89554effc45b29c3a5f65ef3ae

    SHA256

    27b790faf7bbb7a038991b38c9f2f5421c40fcb44dccf0c87d1f13e1b3328638

    SHA512

    9a40bfdd38bb268a0088357eef5a2f1e56716295899e5436c187d2f4dcfed729c18f3b6e43334d324d87c032b4bf1580f1099441a881877f3797d2edbaaa539f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Jet

    Filesize

    67KB

    MD5

    418ffa04db14f2654bac2eb69ab1a4fb

    SHA1

    ed912c858f4857622064e72e3965a472c792915b

    SHA256

    1fbbe0a73b3318726cb16526de94ea178d5a90c904d045392727c40ed98c2d6d

    SHA512

    7bcdabcb10c192832a1206db2e9921dbe22b09471505e88d22c3e9e72926fd0444ea9ff3db5ac06ca9d23368262ee8a5a1d17ad7d6deb1166f216a57f04fa363

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Methods

    Filesize

    103KB

    MD5

    0323f6a6d6b1b4dc2ea9a86bdb67d7d7

    SHA1

    c01e3c27a582c707762e21d4dd95964ed273dba1

    SHA256

    0518290c9926e81d2946f1f88a555e7e6adf509d67b16ecffe5d47f59a3a3510

    SHA512

    0cff5ba1b5bd495858cb6005c06ea8d28653f2723224f5eed64faa710a83f1fe2ff2e3850ef3763718ac4a12f986123a5e3c42b7b41f53fe2a076f14faddeb89

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Myanmar

    Filesize

    132KB

    MD5

    13e13da71b031c0889dc700533a1d620

    SHA1

    d0b9eaf6e2283e8414eb6d1465f13b60e95d03d3

    SHA256

    7b95fa9ae1b4388383216e773b1d6d14cfe8dfb5d788f59e127a8940162bf7fd

    SHA512

    b3824f322ffd614a7ed074a00951ffa65aa2221aec5b594a23035b8f434c1a7af21377c2c720191a0f5b711c1cb792ca185b75ea93c823b13e940b5d0028fa24

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Occupation

    Filesize

    56KB

    MD5

    913ace0c1abf0ba441e3b8baf8cc9b0e

    SHA1

    649a2c7905f98a0afe04dcef843d68ee33568b83

    SHA256

    22d22e605d0d477787476b6d64239f5b240ee139818dcf11faadc9338c8d4ba8

    SHA512

    b09b56c58a9800117d742137662daad528eea2c343fef78abfcb023d2d194e621002aebb890e98d14b2121882995ef7342fbb38519876aab9542169ad037c8dc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Providers

    Filesize

    96KB

    MD5

    a51dc886f7c3aaefd47a3f8bd29af74a

    SHA1

    b5aa16c5b321cea8a47a48d15610f4fd962c5b3f

    SHA256

    37442b922e61c1e357e8752b18e1002e3d00958500837791fa0dbc05523f1317

    SHA512

    3c0726ec0eac62304fb75ce76e0ef49b37e86e11542bda712c2f2f298baa67f933167019aa3e17c64728bd367f95c752378bbd4caa32ab83fb5f2e4ae8004ef7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sporting

    Filesize

    26KB

    MD5

    73c4a232fbd6fd5f609e1252258ea187

    SHA1

    e75881de914349d524f37a04aaa8a52034679681

    SHA256

    5607fe360d6b7bc50fdfab89fdc5dfa022ed37a8e53344b4da960c7a704012fe

    SHA512

    80ed892b5aa241f150b2fe47163dc77ea9e6ebca90387af3d1c48a398f83f692263724e6494ba773508a46bc37ce4391d66ce0b675b7b8090d128e4378deffd7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Wa

    Filesize

    142KB

    MD5

    57464fe980fa9f09cb6eb4d85f0f110a

    SHA1

    a018271a804d7306cd334a547a413672d5b187a8

    SHA256

    0e8fff4e6fbe31d0e6cd4f50fbbc83bdafd69f90783babf5273330108e7f651f

    SHA512

    c8295a5b67ee911703fcb66ff308df3c133b058fdad088243b96ff98f6fa1c880cee311b4337b39e009fbc51d67d4bbc3469c1e7382f6677ef712636612a95c0

  • C:\Users\Admin\AppData\Local\Temp\Cab877A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar87DA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/436-67-0x0000000003E30000-0x0000000003E86000-memory.dmp

    Filesize

    344KB

  • memory/436-69-0x0000000003E30000-0x0000000003E86000-memory.dmp

    Filesize

    344KB

  • memory/436-71-0x0000000003E30000-0x0000000003E86000-memory.dmp

    Filesize

    344KB

  • memory/436-70-0x0000000003E30000-0x0000000003E86000-memory.dmp

    Filesize

    344KB

  • memory/436-68-0x0000000003E30000-0x0000000003E86000-memory.dmp

    Filesize

    344KB