Analysis

  • max time kernel
    144s
  • max time network
    156s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-01-2025 07:48

General

  • Target

    appFile.exe

  • Size

    895.2MB

  • MD5

    871cddae520aa4a417da40dfd5041484

  • SHA1

    c24491fbb5121b8e75052eefbd4ca21a8340d460

  • SHA256

    18d0118c5e6b53d0bcec7a45ff974de1bc3ab6fcf4043513c328a84fb16aad99

  • SHA512

    95d0515419710975d06282749b73b235a1bbf19c40e0691ee0f73c4819bea1833bf38d10d0f6685ed7e89396d8840d8d29480fd03a42333a2909432a5a8e8721

  • SSDEEP

    196608:ECR3RYToPA6tzwFCgP/kAsjsIrQIHAJjv27y02:E83bdtMV/+7y02

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://quitaffternav.sbs/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\appFile.exe
    "C:\Users\Admin\AppData\Local\Temp\appFile.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Disposal Disposal.cmd & Disposal.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4256
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3036
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4120
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3144
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3628
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 677458
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3592
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Busty
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1132
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Planned" Germany
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1884
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 677458\Assignment.com + Phase + Enabled + Bachelor + Nav + Deeply + Agenda + Selection + Connection + Spam + Design 677458\Assignment.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1952
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Prospective + ..\Length + ..\League + ..\Newspaper + ..\Poems + ..\Release + ..\Cheers + ..\Deer P
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3692
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\677458\Assignment.com
        Assignment.com P
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1844
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\677458\Assignment.com

    Filesize

    88KB

    MD5

    fb754862e7a684ea2cea629fcdec4c24

    SHA1

    37af54a6d86ac83d4be033d354dcc20b90a39a01

    SHA256

    89b2b5ed46dc426de0aedfc4ab81aff2c1f6b1ada5dd66175d33a5adb43ceaaa

    SHA512

    6cb391acb4740c1d3ed872371eee171b272a2dc3faec8da382112a21273cdf3858bbeda18f06dab2a41ec3d35f1b27dc6ed7d34a61de85ee6db40744e0f332fd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\677458\Assignment.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\677458\P

    Filesize

    510KB

    MD5

    13da099a760560dc0019ce52454b7ac9

    SHA1

    6b52ad43faa6fb18f8ba4994a1bd2c22727fbf29

    SHA256

    07762c8b4631f41dc7aa062b5e9e25f13b496a08e11aef6976d44e6fa0f269bc

    SHA512

    d5dd68647e81b3e51a5f5810e6ae21055cb12cf378ccd513a8444e8012abd0253a0c7adf4851213993aedc94cbba2393304ae615ef4538050075a13288371182

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Agenda

    Filesize

    92KB

    MD5

    7b54ccdc633b3ca7014728ff17052fc9

    SHA1

    1acc8cc97502c474d2c7416e94f1421bdc663700

    SHA256

    1337b49138fb5ba781b8b765c8ffe0d5fd634854bf42851527b34b200bb76b52

    SHA512

    a478b961bef5a08cadf9ef3810cf03da2d5ea85e196d9a7dc70de36f7d0320be1c31d6e768fa6ef287637c87e7d33ee1c87bd55099d62d9861c47d841111cfef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Bachelor

    Filesize

    56KB

    MD5

    36679a8662c0df60fdd584f1c032bbb6

    SHA1

    9d3fd9924912451112acaa1aa1e000ae5bb2db0b

    SHA256

    65977b717dd9523dbfe4f865effccfa4516be1c9562e96aa970bb26b353491ca

    SHA512

    2a433b3416761919cf14c137fdcc44e68784dd26a27b79a0c4a04dcd5ed3bbbfb60b690d0cfd86a151a25fed00210198e147cc50e0161408beb24be2b8e86a01

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Busty

    Filesize

    477KB

    MD5

    98088f383b91437fdda222de538c5f5f

    SHA1

    66a72c3719d3ebfea7d2df0c890a13e8bf564bdf

    SHA256

    de4af44768163452822d0f80355c13f6db4cd1171d34250f4d1ce01cfee085a0

    SHA512

    88347fe7ef30fa5ea5f3c0ab6a4f42de3959313cd23c769c8eff7fb23e3289997e9288952fe31262f6050e56530d9d73dbbb32be8eeeb625c748967e832fdc13

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cheers

    Filesize

    71KB

    MD5

    8d9ca7085d3906bdd82416d213c6b594

    SHA1

    c93cf94f9e90c797f353260c9a08a4200cd32cea

    SHA256

    db8a50dbb676c43d12221247bac8a8c8a1ada81ee2aa46e2e1e804f268f2fdbf

    SHA512

    2fa31b8d1674151cdeb55b5c8cdfe53831cfed5a3b867e3c3a30c719ce1efc1a154386db126511c8b2ad0cc9448d74a3aead0076202f83b9d2f47a1be9b446bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Connection

    Filesize

    88KB

    MD5

    aa84e237b727af6b7762128f26bc38d2

    SHA1

    8461088a9da0b8965de9f0467d76e03b9dfe5400

    SHA256

    7785801ea59e39de489c6bb9a731fec21368953155a7563e4a5e9776613cb314

    SHA512

    7ba02ef747374511fb5c9bc31fb7b222239f48ceea875c03f439dcb0347823fa2bb65cb42cb585929afbd3dd92f69ba1e2e70c31f37e93246e9eb69ee8fd603c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Deeply

    Filesize

    110KB

    MD5

    6c694a2f8f1e7b3bcfe66da096c99150

    SHA1

    ba761dcb17afe597cf50c328f8c50d9694cf9bbb

    SHA256

    b624a63ec06b5d4c5f2d408b9366ec5ff26112de91108bf75b9c70b009d2e958

    SHA512

    a16019b8dc9005c30aa33cf44c18a1b00ff4266c894ad97864601816b481b30fe8f9fd38774a1e81fa9fe8d300a562cdde6d9eafb670ba067df68217eec107eb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Deer

    Filesize

    9KB

    MD5

    2189fcc454ad4b30268e618bd7253060

    SHA1

    f9edf9c6b124a7aac580d6d5f731f1d4cef5e00a

    SHA256

    f8f13c537d27eb81331fc73b96044e6c08a0ddac392e72343f755be9523eb2db

    SHA512

    e89e134ad8e6436a6692eb94cfe59be51fd876012627400ec7debf6d16ddb3cc19a147ac541835723a51c8841389a893f4c3e42d9e89ccc579c3b0b094aa868a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Design

    Filesize

    81KB

    MD5

    48e9818887600bcbf3bd2ef5139462f7

    SHA1

    53c5e13178610dc9c7f63b7af821f397aacf672e

    SHA256

    3212f88a19c63b56c2b18156323443f758ea9d18de91ed580497ac2346b7e27b

    SHA512

    7075f2a8a1f92b5315b1836c64364cdb94d9861e7bb3b7920c365b58981e4fecc0e1fe8110a95b2455f31e50b3429086778eefe871d46035aee06d6eb3167d1a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Disposal

    Filesize

    24KB

    MD5

    fc134a89f92b017041f8ec38cfc57b61

    SHA1

    e7cdfd45989228c8c18392b2600885c4ac3572fe

    SHA256

    8a12e3a6cd248faa248006be71f2d13ce80879ab887704e3bb444f54c0557021

    SHA512

    47c91d4254cb9c29e80421167d2903c3f2c36c55b47e5ce7873c4eeae8b4d372dbb1de391655389f60a9da9cc063d7b17762f37443801e27f93d33b2582893f1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Enabled

    Filesize

    90KB

    MD5

    35801d5c8fd467136c0fc204a762427b

    SHA1

    f9b2db46535ada64bc9075e2d5857f9a9f6aa1e1

    SHA256

    e988c4b661622e265eac9426420773e7d845626eb3a82a5921bddf49e581c4b4

    SHA512

    15499276156da135f792c9c8038d5adf8ab64779b408d59e98bcab5128bade43fb0520a983a0083dd3a566f1f112c8befc2203cb446576baeecc56227b723dde

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Germany

    Filesize

    499B

    MD5

    f5a42d2889af84b69ce2a0f266925800

    SHA1

    35af0f7bc411f2b2c2d44dba68832c5937e7cf76

    SHA256

    2f458041002f14ea5348b9ffadac7c5593cc3927134cfb535285cedaa5ae7feb

    SHA512

    1f7c7c5030c39345eaeaa2070097e1f58c9f1e1eb01d09315af4f5cdbc0ae76f2cbe0e4d5a37aea324072be20e7a120836d03851b40b06fdda9c071a07634ac6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\League

    Filesize

    96KB

    MD5

    04c10dff9c7064ce759b79becfd76404

    SHA1

    96b9d243da072ecf88b2d5e638cd437f634650b3

    SHA256

    6ac2207d0f5d73b8ed01a6e25e1803bf6ac3c2cff32e4e658f9cb2d3b6a851d5

    SHA512

    5b37204036d6ee825ac496d83e8341322d8cf996f5b440a587e012d435b9f367af8cf00628d15a0410471e28b597e95c3e12afbf59f63c60365521937543c921

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Length

    Filesize

    77KB

    MD5

    6f9b95b8af8517c4c3d82275f4095e37

    SHA1

    bb6515e1dc573d65919e6f9830bf817d6d7e6311

    SHA256

    1f202b315f4c8e1303e458cd6314463841ba65a91f2853d822b0a862d7eae43c

    SHA512

    270d16ec359e61a0ea8063dea474a964cebbc27625b3770a92c3de69c09490b7669e234f180f49b7227bcf8dc39ff45fa4f67a4f974c8bbbd0da62995e984635

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Nav

    Filesize

    71KB

    MD5

    f06e532054fb04894395e4c3e07dbf4c

    SHA1

    c24c7fc0e34c58995fbbcd4b886d28263443fc54

    SHA256

    edbbe483f515089b5473a12c828a195a9fd87c4e0deb788640e534f11777e7cc

    SHA512

    7e3fc48e276111da6dcb5b955274903a1c6a766e03efc049b88c2d399b17abb6234010a1fe13aa38855db60808960493125e7fdfe8b66c60a8081c3b9c2436e1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Newspaper

    Filesize

    60KB

    MD5

    ec02572a5e1922488f87adaf32911f65

    SHA1

    af1a3f7a31005bb8d1bf604b403a7608ffa774fb

    SHA256

    b3fe03eda182451b50c93d885952f7a7bc9dff5bd43d989fe4aa1c94836ab553

    SHA512

    210e12f5c01a84d92cdb893d475a805ffe645d80ac403f4a2e7b868649e095c3c69591611408d0c26aa44612a6d56f304203145dd48be9999ba565d2dde5b908

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Phase

    Filesize

    88KB

    MD5

    e14783da406dd69d26eb7dc8ca9206a5

    SHA1

    a87be52a57f73a847ba2ff48607f9fbe05917019

    SHA256

    d70476c7f636e8e9eaae1c7bb063bbbf2e51533b2ff46a54f30ec108ac8f7c54

    SHA512

    01961362951668ed422ab4a0832487110d8eecf06678952053baad594336130b3507be62b14326845eaed3f824bf9f7d26223e5876b881347552e8705f13f39c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Poems

    Filesize

    56KB

    MD5

    9b97c8f5a89f256aef9f597ba3177e58

    SHA1

    92603534eda58399ed785b73173d2c96a859086a

    SHA256

    241348828f72b13bc1f502dccafa34b3c201ca00923138f00d1be5cca33d6206

    SHA512

    3893bc07589f6142b1c78e323d832e2c430360d89074dafd70c584c6f68cc86aad61b68e0385d4a111ba86dcf38603095841546bc298aa2f2eba7d475490dea7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Prospective

    Filesize

    73KB

    MD5

    1cdd9cdcb15811174462a56d0b7a347c

    SHA1

    100674c7807c71bef3865d73cbce2c9f35b83b1c

    SHA256

    9b048ac53c60ac4eae948836160219c329f53dbfef3672b89483a064507b0f18

    SHA512

    905c664c87977628086ad19e21984a4e67ade65bfcaeb345c2eff054429dea53193e5b1567b892e32b2bd9ae215464e8eb75a55c8ab9e34e07e5778ff3aaf5f9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Release

    Filesize

    68KB

    MD5

    4a127bcaef830fc9ae08a6374772568f

    SHA1

    fd571fe5c902a1634ad6ceb85685d4a262d1ff63

    SHA256

    0abe20e4b19f15338236307d7a28fab9f010ac4685cbcd5f5e1235bdbdfde39b

    SHA512

    44dd3b3aa2c5b03174369c4cd51115e1b13f9298788296b271357273b729484b620bfff76c9d06a6fe2e0f9bba14dec84224a9624201250167f63a5f80174d20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Selection

    Filesize

    146KB

    MD5

    ad754d5e6d7b8d6a1392d2eae9ddb79d

    SHA1

    9d9c9e8b5ba251f61009e052ceede809b491e3e0

    SHA256

    a1d800fd1701bfc4dca920480d68e4c233e5872fe4e4bbf6a3f6a1871e3686c6

    SHA512

    0fdd89aaa960f467f385bade8e063cf423f8904cd527cd83029d520485db5cda1b664984ae07c4d37853c970c71002f63dc9c7c85d5717e5a23e086b70c8c947

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Spam

    Filesize

    102KB

    MD5

    a0215b0fe9cfd42173639bb4b7648f8c

    SHA1

    bf9478c10894013ceaae86f518a6e9670ada0f57

    SHA256

    a01c77734d320ac93d528b79c58cbcbd065ade31ef57163d41953370080d1882

    SHA512

    35cb3eda29707c137e70b37eb08e2b4bee02ce4a79df87907b3ae4dc1ce83c10e9d021f2433445ac7bfaa05e7062b89db93a72d6d51590954fe11eb49a60fae9

  • memory/1844-72-0x0000000003FE0000-0x000000000403B000-memory.dmp

    Filesize

    364KB

  • memory/1844-74-0x0000000003FE0000-0x000000000403B000-memory.dmp

    Filesize

    364KB

  • memory/1844-73-0x0000000003FE0000-0x000000000403B000-memory.dmp

    Filesize

    364KB

  • memory/1844-76-0x0000000003FE0000-0x000000000403B000-memory.dmp

    Filesize

    364KB

  • memory/1844-75-0x0000000003FE0000-0x000000000403B000-memory.dmp

    Filesize

    364KB