Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2025 16:41

General

  • Target

    appFile.exe

  • Size

    802.2MB

  • MD5

    243ebea390d509b7fb7387565e583320

  • SHA1

    aa5885374538feaf6ee40132a0b4c1563851b36f

  • SHA256

    478c23b2de51eb562ad8f227dc10a9113d4a4b1634d465a66e90aff79011ede6

  • SHA512

    717e9a293596df0f2a56458629cb2a87b4188c2fca64a96ba354d3a9025edeb0d9cab68133413d5ae300a588b5eafff6c215fe0c53a50da77f5ffd40e3c6726d

  • SSDEEP

    393216:cifoznUlUq0fjgcEgyUsSNdbUYA3azj7+HTlQbGhXB33HHvp1p3OqoIZ9apdx:c2obUlvUEq7wVD

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://siffinisherz.sbs/api

Extracted

Family

lumma

C2

https://siffinisherz.sbs/api

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\appFile.exe
    "C:\Users\Admin\AppData\Local\Temp\appFile.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Heights Heights.cmd & Heights.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2948
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2612
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 138726
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2552
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Degrees
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2572
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "locks" Champagne
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2832
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 138726\Possible.com + Tariff + Achieving + Extremely + Headquarters + Would + Display + Pavilion + Amber + Paradise 138726\Possible.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2912
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Anime + ..\Hon + ..\Cio + ..\Decorative + ..\Muze + ..\Nathan + ..\Vocal u
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1276
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\138726\Possible.com
        Possible.com u
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:108
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\138726\Possible.com

    Filesize

    2KB

    MD5

    7171b5830991e2a603d6c45098f97014

    SHA1

    6385ffcd30ec814eb12ed68d52a26d3a5e86bcc6

    SHA256

    b855a49e99c5d3403d005045ac2b39459d1ba48dd302f5e3b7b6f36bf8aa1670

    SHA512

    de0f1d7170c8b686e6eed775cc92c508bd6660058704551b23a9e72a0fadab987c83dbacdbe2d7c27445bfec3f854d8ca8de81ac4a5a2f6c3aba9093e343b549

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\138726\u

    Filesize

    481KB

    MD5

    520d2b6a94965818ba630c821fed4c73

    SHA1

    c9e79c06757f2f350857650d9dd7627821c06ba8

    SHA256

    3f3bcf5cb782052da330f6f8adb79c844169abb0e62c63e75cf2cba7d51dfa12

    SHA512

    fb9d48a3ce53496e1b21d988128524413068c76c862badeb938d17dfc78465e3ac466608a101854cc26a513ab9509aac48321b6bcdc354c883654d80cf83fb8e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Achieving

    Filesize

    96KB

    MD5

    faf7b34b421218a97aeaf4cf85fbe4a8

    SHA1

    89eeb1e94a6d2e912e5f499fe580f1ca4ede0cf8

    SHA256

    8c6a554d2f48bebd6766ad5887b4d2538891fbb5a8b291ac8f3093e350c9fcff

    SHA512

    b68fa3addb82e5b910612c6b956bfefb0996516620d77d463aea733e37a4ec3cb966f6204b855df40316f0d0d08f9d1b891d79710304df8729de8e847c865974

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Amber

    Filesize

    142KB

    MD5

    f42afe394c6053d374cc957f7b52c88b

    SHA1

    a57efea250990a9c0b8416b35c2e112c35d97a10

    SHA256

    0ddcd4b160d16e3b55f4aa3f1c1508a5aeff666cb32dc8b0529f882e0457c01c

    SHA512

    f8e754c2a07d426922201c80cd501924194c711b9be0f3dd1954bdfac8d5ce20d7e200afd3af7d6a665e9f954b7592cf718e8b93a47bbb2ab48c85bb7c70721a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Anime

    Filesize

    67KB

    MD5

    0bf100407f02c9a7e0fae037494b2da2

    SHA1

    69f82328b47665194a47151fbbfdfe43393ec4e8

    SHA256

    47fcbf7b579b317ae38841b203321d3fa387b91e5f83205ba2b2006bc577ad39

    SHA512

    a64fe1a7102b9dce0b8c3d341b1507a966ff800471d40ba209baa10f4943d5809698897b34309c46eafc7926d6ae4311cf561d6f25698b591203775e6b92ae7d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Champagne

    Filesize

    2KB

    MD5

    3ea60190a4e04e29995e97898dafbdfb

    SHA1

    ea94cc8bc01f6ae7875a19060b02502c3669277b

    SHA256

    a54d643d8d4afc2689c658ea04de618f1ddc4f5593343a07dac178e0da0b1e03

    SHA512

    2e2b2f9b08f7fef37500e077ef78ccc857a6884607a2c89c4318bd0e9642a7671c62339b53ec45e92edded049595dffcbdd697e13ebcb77bd6c0998706646dd9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cio

    Filesize

    82KB

    MD5

    a92b1505763df51bf815e725f265bce6

    SHA1

    a2f4bb632b5db524a5b353914d2968b1b24b983f

    SHA256

    c65afbbe29d53207a2cdc240295760e4e5a715fdc555719505090363966223a4

    SHA512

    7a6930229b3dab447e2aea3655c9a26fe20767696c5b71d39dc4447c7c6f56bac1fe09efe8ab15422b9dbac59ef6bc0da1cd7131175ec893b85371bd74376086

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Decorative

    Filesize

    70KB

    MD5

    c76fe67a47715bba213ce9fa047c6cc4

    SHA1

    99dd6914c0be8d7af43316816b65885466fb0f8b

    SHA256

    7596d0c7de756ee060d06490a7f72cb9ac7d5275fe18ec97a8a89d23b27dc319

    SHA512

    6e6a7f1863ded26be303ecb59aa8e517b33d04290b264309479b6a7c59b2fe7627dc36c00fdcf18986d9d8ec2656bfa89b204730ac359a28b67b1ef3f1ff8d69

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Degrees

    Filesize

    476KB

    MD5

    72cb327dc9b37ab6cfb379326bde6505

    SHA1

    eb1f0f8870f34a3cf43f2956d5f0caa3bec8fb9d

    SHA256

    68e928ee90f97a9f04b8c3574f489c5afc36fa2dc307ec02d934d268cbf1c1a2

    SHA512

    63e74d42186dfef3ecab12ea3de9c6e02dcb7a6d59c729482d2d95108677841a3092d6dfd46c9462c866a62c065fb6c271c2af42c17aa46cfd4958b7ea35a5af

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Display

    Filesize

    129KB

    MD5

    9ebd1a34d62c39fb1b203989f47da99c

    SHA1

    214e807f25fdace21699546ffcc01501f4bf7026

    SHA256

    b4d2cc57547cc9ca5eddfbe3583dcf89e970b7986b0757bf51a3d2ab2cefbd52

    SHA512

    9278955743199764b044492099517525b1791fe3afb3a91a9d77fd7b4cb92cc3970ba4bc65999b96ed270fdb8f6d99b5a425896059931b9d17dc3d8280cd6999

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Extremely

    Filesize

    66KB

    MD5

    91e67c48e82529f8f809d6e0f6ae1335

    SHA1

    bea8867b4604f90a61ff7eec141f8830f2c0597e

    SHA256

    05ac436a7b3c059597dee0aedbf0d252c68cd1f11552ecaa69949d9dfcb7929e

    SHA512

    03d42d86fa824a0e8d02d36739d289d37eb95fe4e275bd49405867616d7fda66971c190d37bfcd2e679413651d08bf6e3cd95f6a18baae965a93bc91da200b71

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Headquarters

    Filesize

    111KB

    MD5

    9bb9501b7b0b5fcfdd6ef78fb237b663

    SHA1

    3903cb2fed563c230445b934106b80b7590dfcb2

    SHA256

    05fd3b850e218fdcc45f72ff88e6101ab115747d26ec8447e7272da358010b10

    SHA512

    64d8704dac07af5066ef150536707a2963f840bdbb7d38e69175aaeea931cc7d00fdd54559f07a35d14cb23d52dddcc8e2265ca1551a9ce918eb1b67e60a1b19

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Heights

    Filesize

    15KB

    MD5

    d6123e5c3b8d30aa5e8f00b9c810efb9

    SHA1

    460e77369f77638a48225d1d49b6a170b4da2b97

    SHA256

    a93d36ed3f215ec3bbc4532562318a5ccb497d71609e7c899c2c27350e8b64c6

    SHA512

    bc7ca61343e2fcb3f4cd81ef30c8f9d52ab79b193d0d6208d9ecde2636a0d7f9eb44999345d4a1820eff7209f3793c8cfc688a7d437ce8df3b1be0b57bfb319f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Hon

    Filesize

    80KB

    MD5

    2e53e63c339c5457a7c3507195de8db2

    SHA1

    454759c04353d2bf53ec1bb939ce243ba334144c

    SHA256

    fed03779d5b13a0f5ff5baf97b0a78985ca24084fe047974d7d0c9b7068b49d3

    SHA512

    2c420f8a8321fbbf7e88a85676a15206a266315ae0f7f4d4e197b5ca3248f37c6b170c31bb2c260dbc7c7bf433b2e375c332f450df17e881ca28b714d1292530

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Muze

    Filesize

    83KB

    MD5

    de73416aa91092a827c565f4eb405ed9

    SHA1

    ec20262a80b6ad7618455e1e61ac80e173c68224

    SHA256

    bda04b1e6220f75be495416bbf4de4397939ae78186eed5f28c49d2696613fac

    SHA512

    e5666f2cf63a36c080d3ba523edb2fb4705f823b3c8a21ba807dd79dd568961c1e029f28a0bec6d8332309833a9b226181baa76f7ffefff462bf39b2b25bd3b6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nathan

    Filesize

    83KB

    MD5

    04330d06eeb051f0561d40e6c7d11f31

    SHA1

    b8dfb9b02548f3d180f7739f122b5cecf9b6014e

    SHA256

    a76ce681108b140754982861dd1e3de15258e8d59553b0ff2e161a1741af196c

    SHA512

    47045beaf341768ba85c804f31027187bd04fb44c0cd21dbc9af7fd30b9dea12a8748523e6c974edb92cee3709e19e29c0e6741969094752cf2b54d2029b2b18

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Paradise

    Filesize

    48KB

    MD5

    96171f591dda5d59ba5ab5a4554b2f0e

    SHA1

    3ec2e26e2077b478abc8996748f5bcad5d4ec80d

    SHA256

    505133862b72b3708d446e3d960c8f9fdc9fcf5258518064416d44d0ef1f09b4

    SHA512

    aee848d907c852691870da79d183ff0e01869767ddbe2c9a0fcc02c1f11701a9e9236321e746919fb2c7c6b69e51e49ddb8c468770cbbdc58caafd0ef3b59124

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Pavilion

    Filesize

    82KB

    MD5

    a62235d5e34fe543eec4b44bc3536420

    SHA1

    a356baebf8231ae5fa398cb5d8e0864c009e2f60

    SHA256

    ec139cb3743e4d792e1d057ba2be73e40f2d98a84b1524bc58cbb2fb12d09f5b

    SHA512

    7bedc2d6fc2f38d082c2c8cb2aa7137f3a9414c5970952fe65f5917517df2d63d2ac7c597ce57d6732bbd5d09df86fd52517512eafaacc84bc7854b0b471fdb2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Tariff

    Filesize

    144KB

    MD5

    7f80ed79334ca70b93dd1e5f56c029f2

    SHA1

    897c95e630d5973b2352d7e2d2966ddb2cd2b525

    SHA256

    253901c9c7c4b55a345cf159310e4c6b5418a9428e45a3586f4c7e4ba20f67c7

    SHA512

    85467ef05a529882900ceed5c528e9fc96ee47842ee24acf6aaeb347ad059a8e4b1c5f0a86fbb9fcdf0d888722460bbc3cf0586f5094d2c309ed9e09a227778d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Vocal

    Filesize

    16KB

    MD5

    d54f9d515f45f0615f32f2b30e2bf231

    SHA1

    4db16f6ce8ded92095ae299769a819618c183acf

    SHA256

    7d2503325e5d73afc2865cb8561f12542b0f550428000225e5f2f0ffb59ae448

    SHA512

    64b2941ed62f3e7e2843a753ea90aef7e16c33a0688e5687b7dfab43e2af0a39a053c6b1e4114fae0e28c623808b2d4a05da32dd4ed2f6773611929446caba44

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Would

    Filesize

    104KB

    MD5

    8f2cf2f3287e0f81fa08d1e3a8040a11

    SHA1

    1463cd2ac6cbb79ceb8f7e930fa44ae1a590d287

    SHA256

    cbb25a8d2d83cd0b9e8c6685fb6645e0608df1ab60155914f2ab012806ce9bd1

    SHA512

    419bbd7598a90a9e7a5261020da575cc207e342456926d45a3afb8845565d01517c090eaabf5200331b792625826b174ec9cc9ca872f13a772eec18c76babd36

  • C:\Users\Admin\AppData\Local\Temp\Cab514D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar516F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\138726\Possible.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/108-69-0x0000000003340000-0x000000000339A000-memory.dmp

    Filesize

    360KB

  • memory/108-70-0x0000000003340000-0x000000000339A000-memory.dmp

    Filesize

    360KB

  • memory/108-71-0x0000000003340000-0x000000000339A000-memory.dmp

    Filesize

    360KB

  • memory/108-68-0x0000000003340000-0x000000000339A000-memory.dmp

    Filesize

    360KB

  • memory/108-67-0x0000000003340000-0x000000000339A000-memory.dmp

    Filesize

    360KB