Analysis

  • max time kernel
    32s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2025 11:06

General

  • Target

    PASS-1234.zip

  • Size

    37.0MB

  • MD5

    65760834f3a039f72057f2debd91dd64

  • SHA1

    11027039cec72c0cdabb0a9ca8271f4bb2e7f3b2

  • SHA256

    a9f9d70ac11bceafc5b850cf44b959c2796a6b1c728f7a4e42fa09c0a87ef693

  • SHA512

    3295e82acd101b622301eecfbfe23b61f6137e6ce86190ded172afcbe3c0143205dd2849f208c5fc3692ec59485e4eca095101a7d7826ccecc2573eaf51cd638

  • SSDEEP

    786432:fnuq+CaDeprnuq+CaDepAnuq+CaDeplnuq+CaDepCnuq+CaDepXnuq+CaDepcnu6:G3Caap63CaapJ3CaapQ3CaapP3Caap+V

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 13 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\PASS-1234.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4300
  • C:\Users\Admin\Desktop\PASS-1234.exe
    "C:\Users\Admin\Desktop\PASS-1234.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Users\Admin\Desktop\PASS-1234.exe
      "C:\Users\Admin\Desktop\PASS-1234.exe"
      2⤵
      • Executes dropped EXE
      PID:468
    • C:\Users\Admin\Desktop\PASS-1234.exe
      "C:\Users\Admin\Desktop\PASS-1234.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:616
  • C:\Users\Admin\Desktop\PASS-1234.exe
    "C:\Users\Admin\Desktop\PASS-1234.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Users\Admin\Desktop\PASS-1234.exe
      "C:\Users\Admin\Desktop\PASS-1234.exe"
      2⤵
      • Executes dropped EXE
      PID:452
    • C:\Users\Admin\Desktop\PASS-1234.exe
      "C:\Users\Admin\Desktop\PASS-1234.exe"
      2⤵
      • Executes dropped EXE
      PID:2332
    • C:\Users\Admin\Desktop\PASS-1234.exe
      "C:\Users\Admin\Desktop\PASS-1234.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4056
  • C:\Users\Admin\Desktop\PASS-1234.exe
    "C:\Users\Admin\Desktop\PASS-1234.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Users\Admin\Desktop\PASS-1234.exe
      "C:\Users\Admin\Desktop\PASS-1234.exe"
      2⤵
      • Executes dropped EXE
      PID:4260
    • C:\Users\Admin\Desktop\PASS-1234.exe
      "C:\Users\Admin\Desktop\PASS-1234.exe"
      2⤵
      • Executes dropped EXE
      PID:2340
    • C:\Users\Admin\Desktop\PASS-1234.exe
      "C:\Users\Admin\Desktop\PASS-1234.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:448
  • C:\Users\Admin\Desktop\PASS-1234.exe
    "C:\Users\Admin\Desktop\PASS-1234.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Users\Admin\Desktop\PASS-1234.exe
      "C:\Users\Admin\Desktop\PASS-1234.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zECC0168A7\libbry\libb3.dll

    Filesize

    21.2MB

    MD5

    d048a16cf471fca67d6805385a2488b1

    SHA1

    3385cd047d14909ccfc0f28d552c2301272e0af7

    SHA256

    f00a35a9725ab3ba68cf340c547e88e8916adc5c2e8c9220d0a76f0f83ff14e5

    SHA512

    1249f917a600a7abaeb88e2efba9583f840bb39c769aa481b991eea40567a286c831749f7950ead4f83d4b6407209a517303a5e8ce7c3830882ff6627a189ddc

  • C:\Users\Admin\Desktop\PASS-1234.exe

    Filesize

    526KB

    MD5

    e2567466f88e3da8bd430a7fd6bbf229

    SHA1

    3269a6517fa157a962051024d8e46e6655740035

    SHA256

    aa4f774f707fcec31895672d4c6845761d57006adf73342ae9739c37b4c9c597

    SHA512

    92d1cace941d468d65cf7dda4a906697e82fefe2e03770a90f473c8a4e6f325f554fcc006c784fdb5b7e663f26d90de53e843cf12a1a90e6f7013a22fdec8313

  • memory/616-26-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/616-29-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/616-30-0x0000000000DC0000-0x0000000000E49000-memory.dmp

    Filesize

    548KB

  • memory/3204-24-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

    Filesize

    4KB

  • memory/3396-39-0x0000000000DC0000-0x0000000000E49000-memory.dmp

    Filesize

    548KB

  • memory/3396-32-0x0000000000DC0000-0x0000000000E49000-memory.dmp

    Filesize

    548KB