Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2025 18:49

General

  • Target

    installer_1.05_36.7.exe

  • Size

    1.1MB

  • MD5

    5cca6a6746a3f3efc901b3eaa503f2e6

  • SHA1

    413e1738bad7dfb582bf325e99b77de497134d78

  • SHA256

    02a0853cbed6c7c556e4f9a62195568f2594cc3a5ef365214bc9289632b1cd51

  • SHA512

    c29c0346167fbb8bc641c717dfbab38e0ed4263d085dfd83b50c557df2b7b3dd00a94097fb949046216c27df3732a126ee11b886c64c165afcbe327b1fc510d0

  • SSDEEP

    24576:tWHjlwZHgyeGKkTKZpbY+h7OhLC17zSIMFRBkPmrpyVY5N:clwRcQ05pt17zSIsE8pyVY5N

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\installer_1.05_36.7.exe
    "C:\Users\Admin\AppData\Local\Temp\installer_1.05_36.7.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Undertaken Undertaken.cmd & Undertaken.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2940
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2848
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2852
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 739749
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2904
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Buys
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2984
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "encourage" Legend
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2696
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 739749\Peas.com + Principles + Delight + Leader + Shareholders + Scientific + Optimal + Accessing + Examine + Appearance + Specialist 739749\Peas.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1936
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Nt + ..\Sydney + ..\Nominations + ..\Colour + ..\Friend + ..\Compatible + ..\South + ..\Advice x
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2000
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\739749\Peas.com
        Peas.com x
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1508
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\739749\Peas.com

    Filesize

    909B

    MD5

    c53abbd21234ff96769827e1ac686723

    SHA1

    fb923f1c9f46fbbbe8e53d02143e632669629825

    SHA256

    e19b4747c4afde97bb8f88d104bade0c12904914eb4f2acb434ce1d2808ff2a0

    SHA512

    430e2111e4ba6022c9600d6e607f9e8d9b8a5362ac2e7dc23e4c4b6667ee855dc7e45eb1c42efb903f69580fd5b4e8b4385af6e43ba4cf1e246a86fdc83127be

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\739749\x

    Filesize

    502KB

    MD5

    dc30e55d6cc35abd376844050e84a4fe

    SHA1

    504bca4e5fb3c11bb8918b3b3b760eec018588d4

    SHA256

    0d97ea67a49b454e9bc914e510ac2c367cffa3323939a2d678e1ae6e9b7f60da

    SHA512

    aac58ea179cb67c1caaa63634cab09a27d82b816c102e865731994a1ab885e1fd396c8b0f471dc11120f8c717e7a1147a1d2fcf108b9a2b570cb2e2d80c27f0a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Accessing

    Filesize

    80KB

    MD5

    f7028cdfced4730ed634a64c634adbb5

    SHA1

    6bc8ed6c6967ab87c2619f3ab03409b956310b8c

    SHA256

    1432f581e94f9aabfa38f097d77c5d16f001c4c06074294d3c240b169305d525

    SHA512

    c48fd29c95ca446a3df903ffaa4ab8068fec5fc97de036996a2b7845b082746b905e23464e2f4d813f1a5aca08a5935c0a2bd75cd3737364339ae98e53b12ac5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Advice

    Filesize

    41KB

    MD5

    a4c04bbcfb82c963758bf1a52a0339ce

    SHA1

    3521455dd9c155fc26204bf0c64eec1db629ef3c

    SHA256

    6689398721dcf897d5b358cf6c2082804d34a8fdc2cb7fba1742207bc57ecd80

    SHA512

    81391feb9b2c3b56bfa784ec6a8b0bc93929f63e01a56b942c4d2aae6a106977164c44bd6f599eb9a082d6981115d4ba0ae4060ecf774e034401f1a582a86a2e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Appearance

    Filesize

    119KB

    MD5

    750d4a3da4ce28d54655b43c78d44398

    SHA1

    e324f63fa5ae56d51187effe4fe477438638744d

    SHA256

    0615076b0abd1be0ff0223fb2c2e674819c36557dc8d1cebf6cc1e4fd62e8128

    SHA512

    e1a5468996e6ed45d4b45440a3909383a0062fa08148488986bc2d97e80bb2c3c88eb5a28716da556aef8e7d030f2c66a5fd847c399b3cdc5f2561dd3a4cd97e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Buys

    Filesize

    476KB

    MD5

    4fad7ecd1031c89284feadfbef908bd1

    SHA1

    9782d4645e4160375a51833ac7a44303309c1962

    SHA256

    2e90606228108ecb952b443efef59a03460a4158ca8088233e973b956e12b6b1

    SHA512

    c05659d241f356cbfd5fe0b1628cba396710cb25e7208fdf40978f7fb596fefa8e5f3ca15ec2c6f63c1133f23054d7fb7aa6c4c699d68db0ba23639bdc7a6f62

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Colour

    Filesize

    51KB

    MD5

    0884e939f7bae0e4edc423d48184c70b

    SHA1

    fa5ba2736fd14f9478df0832e198966b5768d5ca

    SHA256

    674eeb973cb37997bb7caf6fd13ee43cd550ad6e7f0cefe73071b8b6925648a9

    SHA512

    bf9265c8ec8510abc9c9cc5f1aefe0e426f81c6ad870883eab3e25afb7118b2cf438999c9a16d88377b334d4cfe072244c12ac7c8c8a679a976bc51811b886f3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Compatible

    Filesize

    72KB

    MD5

    a5928c4974a876ca684e078da16dccf5

    SHA1

    d3da504b6ec88edf6f23ac48bc6ef459b4a308ad

    SHA256

    13e7e37f5d88016b479baf5006a7fd553319d01b9a9c41950d2168d274adfee7

    SHA512

    da6eaced6b3c49034c8d29c6d0ed83007f88faad7a0c4ba164b03e668e4702df20de0df97eacac8cb65b50ddaa84a1a2be0c857c8ecb12ef59eb27147fe5dc56

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Delight

    Filesize

    79KB

    MD5

    f8c60662b9196cc548a1d93b16e14c24

    SHA1

    38f06813eba4e660398d39d1cead7e7e02db40d4

    SHA256

    25a939b98dec8c281e04e57ec9097eeeea11cfe25ec490d8693e5a4bf954475a

    SHA512

    9b0e4035d931fe55613654de383c42e601e1f10be0b09f518bee0517e376d3597637808fdb7176549f1fedb2b83e0935898e3e8eb2a8802005fdbce772c48404

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Examine

    Filesize

    50KB

    MD5

    91791a5777c9b3455784c1b1a912e9f1

    SHA1

    0629284bdf572d017d00c23bf15874a8f70d821c

    SHA256

    34e7b453350c7c17b32a14c38ecb7b33d40eb98b0ea952af1dcdbced2bdfcc6b

    SHA512

    e5a842fb7ad5ec3fbe0012097233bf99bdcf9bc1f223980f9b153f2540f256e945fafefc86608e226313018ba56f66cd97fd0ad44f008f14fd0fe896fecc43cd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Friend

    Filesize

    53KB

    MD5

    1f00e32a22c3ee6b6400642b19f81c4f

    SHA1

    fefe76802a9862def5811552181fd6dd1da6c833

    SHA256

    8c28e2f30c68b709a000088ed293cdaf7321a1d814164e79c73803333c4f15da

    SHA512

    7085013c15e7ce7c2aa18383e2ff4cd297e290ca60487de05de7347aaaf57db0b3d085a8014684709e6a53d815431adae52c478dd5bacbe41fb9431dc893a6ac

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Leader

    Filesize

    106KB

    MD5

    38427e0b4edfc0eb3a3e7c4cd3bf8051

    SHA1

    2b543c7b53e5a173b3336e2083a27c062d0ebfeb

    SHA256

    e11f43dbee53bfe8a2ee3adbc7deb4ed695a03d025579a5bc748e69e97866da1

    SHA512

    9369f49c97fccc2ef401530b6b922b07898f00e4c59f3aa1a23259e0423f518bd428e008416c697c5eb556e7eb2430fd63af0fc8dee641c96eec7d57262a049e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Legend

    Filesize

    918B

    MD5

    a1d8d76f2ec3d9f7574c6c3ca3be236e

    SHA1

    97f0d9fcecd6b5f3476192391ce728c31cd5ae3e

    SHA256

    1d8d218a4c5ac2af1a076e21386f76934e31c196873d0c392de4459b4b1bdc15

    SHA512

    d459e858c4fa2f37fe5fa07b9c0aa563ddd8d3a343f8cad8a3b00f5f5e823a1d591a29af76b021098ce4d3c0e47836d26c7d90dd32c0f975ef36b18665a9dc66

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nominations

    Filesize

    52KB

    MD5

    ca4d3ad1670dea01971ccc8ce046aea1

    SHA1

    52e810a6083ae0d503a1cfbbe0c6281d3071aa47

    SHA256

    b31a00b5739791f49025bc6b9fee2bc14dcb01fbbd3b24d9a280d85e6efcf0fa

    SHA512

    f566cd66ba52f90e59d6ee0b84a9fa2e8d2423559058012bc0c2f737f2288aa01e6b24e722422904c80b4926b1ccc51a91b8a4c2ed29a756440e763be39616cd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nt

    Filesize

    88KB

    MD5

    e05daf81a9bc6a925b8059a420244f85

    SHA1

    7ec2aab716124f6f79b64daeddb71cf7b87654d5

    SHA256

    634bf390c93d3036948429ac2eaf51fc7be656e1828d2728ebf1cffd8a844d9d

    SHA512

    19201080c54949398d7098af8557b58a4aee6b63ea8092301e7f8cc30cc086c5d116d91a47c80a9c7a785a9bc817022ec8c66c448c462805281ed11ee7016701

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Optimal

    Filesize

    108KB

    MD5

    a991ded3fa5dd76d2b05bbc0d120b1ae

    SHA1

    f3133ada36ca77e677415974224085a5d5c4c868

    SHA256

    100d96f243efad210f414c57ed41bfd1df6df0097d5a87335eb57e783aee01b8

    SHA512

    7bfdc73d6be63d37df6560118574f4642ad506ab59ae690411e38eaf6d12bc057f3df682fbb14f2e108a6f16db90683b7071a5a8d1ac13c46d80cb8b30260f5e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Principles

    Filesize

    85KB

    MD5

    dba13cba3a6210875468277513d72f00

    SHA1

    a70f51c51d4578dba8ddd1853f7d8d89bdba9a72

    SHA256

    d95e75df69bc16e82a5fd2c1c0572a5bb40805fa0567a932b811b0bc5d269a84

    SHA512

    692f6749f34d657308dc21b74c5542b7e623617871976638da25105ca6879974549e57f9ffeb9c5b6679e8c2bc4bb83c4b1155f5986637c7e3844b1b463feeef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Scientific

    Filesize

    144KB

    MD5

    8956395d6188f090150e3c7cc61ef8f1

    SHA1

    9b66234ab58bb751a94e569fe4340eed97f15491

    SHA256

    757d8775354b35180b7775539ce201b53592baae081d62c6ead2b151d33902b4

    SHA512

    de5658029bd02104f38089f9164393faa8e0f1996817e4d8fb115dc27a73f76e00ccbbf64c327042b1c362cc411db3745ab61a378be92008fe0053b32498bbf7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Shareholders

    Filesize

    74KB

    MD5

    2e79f33316e3adfb64bf92dfc6799bbd

    SHA1

    e2c32f618acdb883f2de44a451d870c42300bf0e

    SHA256

    2dc453f6ad8079995782d57deb8ad13d06f741c35daf9d4b41906cf1bc721455

    SHA512

    685c801abcb500b8713e239f427d5e10869d78b3259b33495285cf7ee9a6e78119941d6241be885a1a095fa8900a2a276a76a70f62e950d436f78f9001fb5858

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\South

    Filesize

    73KB

    MD5

    67d925e40c86d579cf5e3f8ac3643271

    SHA1

    678e8263a31536f38d459039c083f911f66974d6

    SHA256

    f0542a986093bfbfcd9258f3197818f3b210132722ad1f5e850a65f0b25795d1

    SHA512

    761ed52371dc4364609c514b5f4eae1ea165d70647b83bf67637b7379b7c6e8339c4c56ad3a1ead626f276701c595e91b93ad88912c647249448d02dcc890cef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Specialist

    Filesize

    79KB

    MD5

    fac14843f17fce8167ec0fb7fdb107be

    SHA1

    e6e51d0e755af6f9e76672d403be8778b886b60d

    SHA256

    b4d1cc56fe3b4658c84d76b0d314e86c254b23f0864aa2d25cfd94755387a437

    SHA512

    4fcd35c877477ef4a3540418afab06ab24d4c7a20a8ad1bb314bf97b4732374ad25d90ab4fa20e2dfe71ea15f25e6668f8972fc7b416fafea46e90d76d18a6f1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sydney

    Filesize

    72KB

    MD5

    201eba6bdb63df28794e18cfaf067bb4

    SHA1

    b9eab03464c049198d3b5bc6f648f0749d83d64d

    SHA256

    7251bc25a67bfdf1c62b29f322c9b8fdd6a6e8ffb3d5415cd16032090f1e96fe

    SHA512

    9dedb0c51d3ebfb33643bbe994ab433fc73f3097fc51b7f4bceff8f1f8fc7d0766123526eace6cc248fa191b4dbdba2bf567621b55c3f5356e8d44a53c8b9542

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Undertaken

    Filesize

    16KB

    MD5

    c94f8ca767a2faaff1f7598d99a4451f

    SHA1

    809b917f4081943724e63a27f5650a4216c307c2

    SHA256

    6718e0bbf094079d1575f3677f25d1ac7b3f08844597418f0df787e6ee546d59

    SHA512

    936a22b55c4fd5212e815f2b0d9f8fdd0212e03fe96ca6f785e549d0ab46db7a22e9568b74f54d243c78884b7d5e6e8ffb3036517cdd35fa17e6a7778e485afb

  • C:\Users\Admin\AppData\Local\Temp\CabCCC3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCCE5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\739749\Peas.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1508-74-0x00000000033F0000-0x000000000344B000-memory.dmp

    Filesize

    364KB

  • memory/1508-76-0x00000000033F0000-0x000000000344B000-memory.dmp

    Filesize

    364KB

  • memory/1508-77-0x00000000033F0000-0x000000000344B000-memory.dmp

    Filesize

    364KB

  • memory/1508-75-0x00000000033F0000-0x000000000344B000-memory.dmp

    Filesize

    364KB

  • memory/1508-73-0x00000000033F0000-0x000000000344B000-memory.dmp

    Filesize

    364KB