Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 00:05

General

  • Target

    Cleartones Everything/cleartones everything.exe

  • Size

    784.2MB

  • MD5

    ea965f92edd7cdae2127c38a9272a510

  • SHA1

    d692194f3184d7c97de12b60624f397afa306634

  • SHA256

    038bd5f9da2ee5b0684c3f0d660de014d06431a1ddfff16394b33396560ce1cc

  • SHA512

    0c14a38c62af7ef9250731d0d725e1e1784de6af42490c70c230f9781b69735f5b9e3c90193e6e67c022fa8b74e683f9d9f3eab6c46f2976e2daf032583a8249

  • SSDEEP

    393216:HWRpCKzYnlGGJjBeYH8n0oVJZsmW2pYUOt5ri+dM:HWRUPFJrM

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cleartones Everything\cleartones everything.exe
    "C:\Users\Admin\AppData\Local\Temp\Cleartones Everything\cleartones everything.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Portsmouth Portsmouth.cmd & Portsmouth.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1700
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:264
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2764
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2748
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 552526
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2920
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Simulations
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2948
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Recognised" Nominations
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2616
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 552526\Portland.com + Characteristics + Modeling + Ind + Kingdom + Heated + Securities + Irrigation + Twins + App + Compare + Wealth 552526\Portland.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2640
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Participant + ..\Old + ..\Ends + ..\Connect + ..\Fisheries + ..\Tablets + ..\Nationwide + ..\Vsnet E
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1028
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\552526\Portland.com
        Portland.com E
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1464
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\552526\E

    Filesize

    486KB

    MD5

    709f637ed80b635e3f1359d84977b98e

    SHA1

    48c3e4d4717b6e7c3e3d504f73cee97329f3a606

    SHA256

    0b03b42f9769715bd3b5384ccf55073d5369ac24e7ee84acdccd0da34f8a1bef

    SHA512

    ab13cd3beb03680f05171d4abc8c42d59a88ac4734872618f541bf43456e43b660bbc6083bb7149cad2a749a1f5668ebb0c51984b27f466a498d99655873de70

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\552526\Portland.com

    Filesize

    2KB

    MD5

    2d44b432dd9d7268ab56cb3d09f5e7bb

    SHA1

    38c2018b1ae588f30a94c648272d9a5d9651e2e3

    SHA256

    60ecda23a534ef6800be125ed36c4bc95142e2d31afb5602ea820b8b09f4f018

    SHA512

    a703e213902de6cca9840c92dd8df2760bcfea4984d4555c3987ad357ae1de89b26fd0526daf626215e9914ae8eb43835259e8fa9b4d9c6d26a803fe690d0a2f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\App

    Filesize

    58KB

    MD5

    c6635a04e48a3a15145742224ed3a014

    SHA1

    1271149731d10c933a843dcf8dccb388cebfcae7

    SHA256

    ed29423104db4e42bef30963f5b15e3134945eefe182c93db22cdbefc50b3c63

    SHA512

    2bb3a6b25e0346562cdd6f6c74a358ccd1325bf5d29ea8a7b2cf62fdb7466d3039875f993fd5d0fe3fd70f4cab538c8c61526760002f6f7f4ddb9612b7b29e19

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Characteristics

    Filesize

    138KB

    MD5

    de99c5b39f996d640144689cb11741f4

    SHA1

    1cc706c70fc191f3c4d97a7d7f99bb6aa885fdf0

    SHA256

    8e9fd20f4a487861218b3155356005e1eef0faa77082a48f379def97099acb60

    SHA512

    cc7e794a5d7555a57d0e1e147377fadd3e27e7f67cfbd218214e032f556aed426285161702efd2bfbd6b45dd36309e01a1f1e1d621da5433454b43af37c34491

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Compare

    Filesize

    61KB

    MD5

    a96c742556a48d9c3bdb3698e19db70c

    SHA1

    0a57d847c4dbd4164a695890b55031370ffcdd66

    SHA256

    1cfdf90b349c58d6b40c518a9c3a3dc87c20034639e0c41c5ccc6a5ebe8fd0f1

    SHA512

    fb6a1c253834a5b49923c9ed494d0f4ac81e3b53644bfccaeece2ca0eb2e170fa0a33c956638cdacb963fd0aca14a39bb24062e40e8af955baf0eaaa62c36e1d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Connect

    Filesize

    56KB

    MD5

    3c3f4ef4aae03e22dd2ecd42925f422a

    SHA1

    009fb549e6e74a41b400b922904e0ab5cec81442

    SHA256

    da444fffe9adea173d6a34c63a5184b39d8b364e397d703cf45dcc411f017b77

    SHA512

    66287935e2e9578be4304d1cdd9f522b354571feceb3baad20e6d530f013c75bb790f9013a14494323b7e97424f134dd53eee3f63c6eadbc25f19f624d184cb9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ends

    Filesize

    56KB

    MD5

    84fd2b0d12391a8ce73c49aed9d7d6bb

    SHA1

    d15efb67d5f1be2468c14498c3eb095825315e96

    SHA256

    a127c719f9b0441f90b51b8123f64ced3c9e44eb7bebf950af2969ae25ef6aec

    SHA512

    18e1ba8780699b9ebdf3f3b3325111c475367f79186c682c2688ffe81c9174566cb0c72d589bf622376ccecb805145a03df06747773907a7297972ac6d4eee32

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Fisheries

    Filesize

    61KB

    MD5

    7c8ffd4ee14d8e9af19e66d6a7455bf6

    SHA1

    776489474a386bc4b9a20cb9ee02d328b2142859

    SHA256

    4ae56d265ba691647226534c52e8fd00c238d54ffb85c9e0f5b3547ac8fcc1d4

    SHA512

    f405ad914e45ec800ea30d7ffd1944a7a9431e6e68880a5013740ee182647551680e23fef242e136c8628ad349ef935c93dfb6a02151103b5b77fe9cb630a6a4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Heated

    Filesize

    77KB

    MD5

    eea3df89eac51405f15dfb3f1ae7be81

    SHA1

    a9b39c76a03f397532e264bf96330e05658967b4

    SHA256

    9e6326d84ab7bd3b9cc74276480c398bd63de355344ebb1e3b793c5b29abc642

    SHA512

    aa65fdf62f38ce91f11aabaca7b99afa3e651ebf719bed72fac7c5861ce19e1fdf31cde651cdebf2d23b33a65c12b94ed1c25731382a963d9d06af586c190756

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ind

    Filesize

    68KB

    MD5

    7aceea23583421222b3f690a706e9381

    SHA1

    24ef4289d0a3aff8dea73e6de7c2a5dfeca45eb2

    SHA256

    16aadf5915fc8b51c8a85096ae0399733325540efb867c5b9c64d1df1b6998a5

    SHA512

    8bae766644021876048c298f8c27bef408d238e4d61487211681156c84050ea3ee289365d20ac530f44f05a4cb604a19d59239df8b891d98fa42af0f2a0d2769

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Irrigation

    Filesize

    70KB

    MD5

    a06b796822f7514dcc70762b858ee6d5

    SHA1

    fabafb04b3f78ac193588cff81ae465923a3ae65

    SHA256

    4f56020e79c1d926791b4db46b1fb5042022cdbc21219c890e36b700a27efb15

    SHA512

    1bd4c991ed45231efbc8729b06bda0e6e0055daa3fe50383eac8ea7b0f7007bb024b93eaee4985568bb7d1f32d81a0f346784d913b2a7bbe467a6d36a98effc8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Kingdom

    Filesize

    85KB

    MD5

    3224b792c4cf03b7b012fddb8373b4e9

    SHA1

    3e17b589336e8bc13baa013c1e287b5c0d60b76f

    SHA256

    7698a145d5ed7df8dea306ec966cdf047bc0045a4067ac8fbbe72add97bc8d9c

    SHA512

    b88328a470f44b5dbe8f06ec01d3ed6cce53dcbd21c1d2b90586f81f7a6b3df2c3c58010ea86f29dc2f2862b9119d5a9cfb3f82d8acac2d9ce1e09937c58ec52

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Modeling

    Filesize

    138KB

    MD5

    e0351d0cb2ee5d349bb8164ea8c2d3c2

    SHA1

    179164048df87711cf5499bf6b8df6eec32061eb

    SHA256

    523d3627d08277efb9ef833cfe9167062c92b8cbd9f26a1e63558036e19e2de6

    SHA512

    b26974948afa9efbc01f5a7f3b5f6c9f76a2ae545ecd71e4a7a665d2896493150606f6c9c141409bf4f61bb1249d4b762b812bd0d91294f5eaafa8e763049d13

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nationwide

    Filesize

    71KB

    MD5

    5cff86b59267a592e5381b0b7388231e

    SHA1

    9a93903d0c44d7972bd91a0f8243d511e0f519b7

    SHA256

    d2040dfe9ef02d782ac64e80ad2df756ba6147847454c3bd48aebbd9b7c3b4ae

    SHA512

    0d9c796ee4ee97b96dba4421340d6d468eb924d823980d0e935f70575fe303e6aeedf365cf9dbe051ed86bcdfd0d37858a0fdac81013d1c61488cf0ea8d0154e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nominations

    Filesize

    2KB

    MD5

    38f5cffec0aab7d670c554f277b00b82

    SHA1

    4e001ea734583f7dabeee95af8f1104e408982c0

    SHA256

    2891b875f2a72a571e4f3fc848767ac58abdd8fded6fd2ab8f5541548df58504

    SHA512

    c297d0f75b6683c15a1cf30acfdcdd78cd9f731292220bd6227f26038cbce2b30c785b11e9f4c7e13e3667d70ff50f7d727a957766ea1068fdfecd0194641b4d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Old

    Filesize

    78KB

    MD5

    a780df5fdddbfaf0eef8f13fde04636f

    SHA1

    38753624ab3054a5ab1fd7928028033abf5d7da5

    SHA256

    a4b28c56a0b71d2539799d8ce3370a9972da75d39124f35307802b699b51eba3

    SHA512

    5b5ff3c729196f28c843b1446f0a83ff2224c69dc5a0be33f93ec21afc7cf8e4f4b3c1ec41a2d5dee1c4e45a23d066eb8f7c73b70d1dd5b7e3c3c2bd25a6c905

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Participant

    Filesize

    79KB

    MD5

    e16c1a47cb9ea6680a751f5dd0494554

    SHA1

    5e9838897400e927ce56b6d26a8223fe29dadecf

    SHA256

    ce6609939e67ea63e114ea17184f64667c19ab1ef79d425feb9305a3c13714c1

    SHA512

    b7643174f67aa2f0864fca13541d8c47362e4f5ab35dfecfe93521941af397ee117fcccf551026b794158e2c077e243cdadbc2d617d05c4bf90af732c6fcbb57

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Portsmouth

    Filesize

    18KB

    MD5

    9f60e4be439ad71a6387725ca5ffea12

    SHA1

    f0619b5e72e61a1f84f1b6cd8cdd4bea055199fc

    SHA256

    12eef0099d63ca3f0d0fa88c661d700baa51e5d6ceb10d85dff645dff5df2088

    SHA512

    8fef0aa18c8e1b3cc6638411135c7ec617ce44fc466aa5c3ad3ad8204790c7f0f4131e99cae8b72bd7e581a524b2cfcaa9d7d089a2f056b0e7190ddb6a7d2e7d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Securities

    Filesize

    51KB

    MD5

    5f15affe4461eb0033b83de69af12a2a

    SHA1

    a5244a0af22ea8ad3d5084d0e89a0ef936df4e49

    SHA256

    716d615dc2f3a700bd1e872738ee58942cc3f8517e94030ad670ceace00d6a2c

    SHA512

    7c560604b246a9b52159d9fc2ba590fc5c4ceb634be519fb723666020e070840ed63b50c248a9908652057b5fa15884c6373790445315de05cfe34b44fb29549

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Simulations

    Filesize

    478KB

    MD5

    94615786195ce2cf019b7cf9c85cbb3a

    SHA1

    c995483e5e3cf19db64df881efcbd72cc7ce909c

    SHA256

    bee83606277ab6cef6c2b345b4197791aea76db613a8d90ed710377f0f8d33e3

    SHA512

    9cf0a2665a3aaa5380c897a12fdaea6f002272ae68c512eb704c999d35a631257fe1c979aa411834228de2fc78e19801823da5b14d58856a091d08aa402b97df

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Tablets

    Filesize

    80KB

    MD5

    26d40060e3d54c91ec2932452a48c9ce

    SHA1

    80d8111778774e784e3a021893dcaa858c2dd6bb

    SHA256

    aac57e32eaf4b9f987c6852fd4bca672411a19fb0349ff53980f845f98f9d275

    SHA512

    8aafe6667b614be73fcd4e6f5cddc2602ccf45ba1a3216a2b1ed2f5d8b3a3a83702155dc16500c89aa8551729c5bb0dd3a1bf6f3a35638399bb42d0e277a320a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Twins

    Filesize

    56KB

    MD5

    27cf462b63758c61b72a58757e1d3f86

    SHA1

    e66be096d59a128e9b6e051010a364228e7f57ab

    SHA256

    3a6b6e82ae5709d24ae19a1351940f465d16bb3c61b97b25139a21c358323d0b

    SHA512

    4ac1fa2c1feef3d6c578ba9d6b4e1fe0d141810ad08c3098e30fdae5da8354fc79af0195c79859f58f737e63758eeffe998b10f8da5f25ea309b6cb29037f46c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Vsnet

    Filesize

    5KB

    MD5

    d61854bc0cbf1e9adcf2ae6239cf9c38

    SHA1

    5fcbc1252cd314af60426ac89ab2b0ac82439d9f

    SHA256

    5df8cec455034509ebb7385bcd3124ef5dab4f5b9a3d0b4c3903f7a5ab75a079

    SHA512

    9e0989680ea022b89a691cf903577074ccd9521dd6e4bfaf99790ffb293144c740a32f8fcecd52908adb349288ef7fbead11f013bcf229dba2d19eb2efd1a2c1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Wealth

    Filesize

    120KB

    MD5

    4b0c34f6decc1d37c35607a3fb0eebb5

    SHA1

    6fe0964e78600c1fa63059e7473f004de67c26fa

    SHA256

    c04b4ca222d6c8c1f514be8765cf6b97bb07d0f173c2795ded66ff3fe30096af

    SHA512

    cf6783fea31599772c1756ef6ca22d584a31c2674a42f396013d51923e27b6c2aeb8711e73cc29c1960693dbaf4ffc6d14f3bc6a2e7a2f26aadd22632863b3a6

  • C:\Users\Admin\AppData\Local\Temp\CabBD5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBF7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\552526\Portland.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1464-77-0x00000000034D0000-0x0000000003527000-memory.dmp

    Filesize

    348KB

  • memory/1464-79-0x00000000034D0000-0x0000000003527000-memory.dmp

    Filesize

    348KB

  • memory/1464-78-0x00000000034D0000-0x0000000003527000-memory.dmp

    Filesize

    348KB

  • memory/1464-81-0x00000000034D0000-0x0000000003527000-memory.dmp

    Filesize

    348KB

  • memory/1464-80-0x00000000034D0000-0x0000000003527000-memory.dmp

    Filesize

    348KB