Analysis

  • max time kernel
    210s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2025 19:55

General

  • Target

    Solara.exe

  • Size

    526KB

  • MD5

    51749a96a9d6c32d40c490e370f1c6c5

  • SHA1

    e4c5b079a557e452b19c24ee8e09d45c0d87df23

  • SHA256

    7494b75566c33c247a381887f26054acc2ea068c2485d5d0cef2fca6812e70e6

  • SHA512

    e4c20bd1bab6f0ef9cea473498d108eda1cf01a29c59da986c350a0834b8fc2d892f6a8810268a2233091d266d4adc4d79699946d974f38672f9815f3b1116f8

  • SSDEEP

    12288:rztE0u86qlmk/5i8go6BrwSMpZg+GBv0JYlCaVJ34:rO0uYlmsD6dGUvHlvJ34

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solara.exe
    "C:\Users\Admin\AppData\Local\Temp\Solara.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\Solara.exe
      "C:\Users\Admin\AppData\Local\Temp\Solara.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4384
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff99297cc40,0x7ff99297cc4c,0x7ff99297cc58
      2⤵
        PID:836
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,247505280067624893,5247594250189622042,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1968 /prefetch:2
        2⤵
          PID:2536
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2108,i,247505280067624893,5247594250189622042,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2224 /prefetch:3
          2⤵
            PID:4992
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2320,i,247505280067624893,5247594250189622042,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2268 /prefetch:8
            2⤵
              PID:1120
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,247505280067624893,5247594250189622042,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:1
              2⤵
                PID:1784
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,247505280067624893,5247594250189622042,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:1
                2⤵
                  PID:4124
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3912,i,247505280067624893,5247594250189622042,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3688 /prefetch:1
                  2⤵
                    PID:4132
                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                  1⤵
                    PID:4708
                  • C:\Windows\system32\taskmgr.exe
                    "C:\Windows\system32\taskmgr.exe" /4
                    1⤵
                    • Checks SCSI registry key(s)
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2612

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                    Filesize

                    1KB

                    MD5

                    b5198955d1c87b7050d76b271201ddb9

                    SHA1

                    af3089a34109e53b88f98b5a2b039f75122eecac

                    SHA256

                    520949b57f489b94ea00f98d1a9e577b7769c4f17685ae1c712332597cd0a777

                    SHA512

                    4740702d33adec326f6c30247443e57f2c01f8d38f21b9b5195dc2238230ae001a7345a50ff571e5c8ff8ecbac309d80f65bbaad77e3d9d0c55ec31b2a9f1827

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                    Filesize

                    2B

                    MD5

                    d751713988987e9331980363e24189ce

                    SHA1

                    97d170e1550eee4afc0af065b78cda302a97674c

                    SHA256

                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                    SHA512

                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                    Filesize

                    356B

                    MD5

                    11cc90327ef642e51359d3e3b0e4710c

                    SHA1

                    c4419f3dfb532c56520f54e413e17e3a109ecc92

                    SHA256

                    5dbc34f401ee491f666b0040d9fc549f22bd546fa908667948c53727cfb5e0b9

                    SHA512

                    bc1b98752b02e50693167c2926b26c1198513041127cd8a2aca274a1e3550b8b251eed4c1ce334e6c5d05762c87de9ac68aadf9e82d6279849aada3d63c56aa9

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                    Filesize

                    8KB

                    MD5

                    25128d1eb3ed559a17081e76aad16559

                    SHA1

                    34353a3d130b4f464f43f0d281c7c3a621f23c2c

                    SHA256

                    8ad4773351b15d935bc595bd88ca20c0349190f768ed38d88859658f0a911040

                    SHA512

                    674bcdf6be59a00253a0e0590a1d93fe9e424aa503a8f651f5972f26c59fb4386c96553595ea2d84dd1ffefcb5a08cb93436ff756ec01d31d6a6a634f7d1e6bb

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                    Filesize

                    116KB

                    MD5

                    306b578ec159ccfa64bc5eb59ad10799

                    SHA1

                    989d99e0b046c2928d7d19de0e945e6b8c961edb

                    SHA256

                    fd019f43a5a8fa8dcbc68264ea5e408d832c23019679166faeb2852044ed1b31

                    SHA512

                    8398dfed431942d10165262faacf2678995cc11dcfcfdfe6394e353c8247987922e2557a96c819aff2b70b2a9704431dae8686e42ab085cbe8ff879d928a6f85

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                    Filesize

                    264KB

                    MD5

                    f50f89a0a91564d0b8a211f8921aa7de

                    SHA1

                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                    SHA256

                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                    SHA512

                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                  • memory/2612-124-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2612-125-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2612-119-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2612-120-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2612-113-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2612-115-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2612-114-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2612-121-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2612-122-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/2612-123-0x0000024873710000-0x0000024873711000-memory.dmp

                    Filesize

                    4KB

                  • memory/4384-4-0x0000000000A40000-0x0000000000AC9000-memory.dmp

                    Filesize

                    548KB

                  • memory/4384-3-0x0000000000400000-0x000000000045C000-memory.dmp

                    Filesize

                    368KB

                  • memory/4384-1-0x0000000000400000-0x000000000045C000-memory.dmp

                    Filesize

                    368KB

                  • memory/4456-0-0x0000000000A70000-0x0000000000A71000-memory.dmp

                    Filesize

                    4KB