Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 00:05

General

  • Target

    Set-up.exe

  • Size

    800.0MB

  • MD5

    789f5d29d14845fcd589b2fc0b851334

  • SHA1

    94a07132472f16b411333111c2d0f6057329088f

  • SHA256

    fdcae90a93bc31967bfefa7ccbb093e2bd084e94959d72d3676c48fa7108d697

  • SHA512

    36666deae33a8e1838183ee7100e8fdd56b7ef67eae0922fe4286d789ede47cd0cffaf46a953f3a212bfef4435e00ee59e73518530c8fc6b1a09dda74de35397

  • SSDEEP

    24576:oJyQxTjqSG9r9B4Qr26l3jHxJ6Bb92rNJUoF72SauEEO7b9yHh3H:2bqSKnxl3jHSMl1EjMX

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Set-up.exe
    "C:\Users\Admin\AppData\Local\Temp\Set-up.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Motel Motel.cmd & Motel.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2924
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2832
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2836
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 312875
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2096
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Memorial
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2916
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Direct" Reception
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2396
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 312875\Tracked.com + Pike + Propecia + Bite + Kit + Encoding + Epinions + Bool + Back + Halfcom + Remind + Patient 312875\Tracked.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2240
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Ingredients + ..\Dying + ..\Postage + ..\Inner + ..\Efficient + ..\Browse + ..\Riding I
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1200
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\312875\Tracked.com
        Tracked.com I
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1788
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\312875\I

    Filesize

    493KB

    MD5

    2b4d1db384602401d735c6905423079f

    SHA1

    7f9f42c963f689742f71fad001572f65a6f37f78

    SHA256

    0d0795b6da3c9b2c17e1fadd183dff36739118e222a0825d5084e1970ebfab50

    SHA512

    dab02f1e1d7689da73cf6b3a4b34f7afadfdf6e96de05a423948224c18704b5c02a7be60c4ce59f2298790cc668a7835672ad7bf48b529c23c7e8242c49b46c4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\312875\Tracked.com

    Filesize

    2KB

    MD5

    d4fd14dc9a8f2265bd71b93af73410de

    SHA1

    f816c74c09e202904c593e34253c0814de964e29

    SHA256

    a16abdf128c982323e06f674f10fdf67045e6ac98a9de7a0a397e0adc44b81ae

    SHA512

    94d6eff2269d7d675216b59f4b82997e732c25e01c473285f0f699e7840a0e7718e974234a9815f26fd8c82cc0087c277d913b7c6c0f823c8a735f5e76b6d21f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Back

    Filesize

    88KB

    MD5

    23d6c3e976d447f6d1e7b2d3596f4131

    SHA1

    13a95e867e16b9b7d70f2a0364047c22fd83037e

    SHA256

    89d61b14665d159a9e048e9d190c62aa435b0a19f855477ac5c411de25377fb7

    SHA512

    fbc7f09857ad43edf90ae5a33b812620e016558320cf6a64a86da060c07f7bd25215c7da8d93128318471b2499f2b20daae9e5a3fbdf8ea928a2a33c3704c044

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Bite

    Filesize

    56KB

    MD5

    06f59a44c4bbb3d39cbe72bebf550d64

    SHA1

    91fc5aa4837b8200f98964bde18f1dde9db05910

    SHA256

    b07124480898677fd977d040a47ed079c3b0296e2721ef9708e756be71e723d6

    SHA512

    029968c019783ae75f14dba50a529936a17fae3dffd0604788d65cf240b63da7d4bd307138bb8650b98b0b6ac5e3f68ee887d1ac96a3aa6c2253d516ab4d62ea

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Bool

    Filesize

    118KB

    MD5

    afe0d49037508182811d23258b102ec9

    SHA1

    206ba4dfbfea8fabf55524901c13cce4c33d8487

    SHA256

    635dd1439e87abefbd638abe39158e8bfda6110cc4ca894b59c002017209a52a

    SHA512

    dcd2a606628d44e112d761c7000f5bd27a728431d8344afef28c3086a37dc500ec29c883eba81ad44395d30ee1240d5a726b9e7596aee8b5708db50c8088e3a9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Browse

    Filesize

    53KB

    MD5

    5b569853af53d13f1f5e33da504962ba

    SHA1

    bcec41c860091d94c0ef504a5736e0acf925b357

    SHA256

    0b3d6c0cb76a475bfaf20c163bdb405112b779c05a7f857946eb2bb88c4b4443

    SHA512

    dc959fbcaa2eafb9c16a065d0c0aa6e18b7d326aebfdf9a87f52354bd86c00b4980265de26fdfab07f56f3718f02f6507e8e73d9a9cc214402405f6d3e3eb33d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Dying

    Filesize

    87KB

    MD5

    d1774561f82eb00effdf402cab18ae70

    SHA1

    da33bc96c96da1a3fd15c1fa525d939461b78aea

    SHA256

    6c6ece0de41b5f33dc52ddfe5908130e71a1c3c7245fa3cff0e2b020d1f061c5

    SHA512

    febe3ea3a3ffbb24fd270c935fcbc3cdb319a10043254864cf6ebfcdd8236488d8f9c84fc390208f30aade982427f9dbc65fd8f083b5ad6c20c8aa100e4b77ec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Efficient

    Filesize

    91KB

    MD5

    482d1ead5b6f6ce894e8042a264ac9e1

    SHA1

    525b058e0c3fee2eec8a134fb7be25b1e57f343c

    SHA256

    05f6e70a77434e805846fd02b3f6b20a59965d698901dc5371d995ab31cf4b04

    SHA512

    0a1c622d10241a4c399bb11562f4961a00b5848f13cff67ce9c299fe39e0525fd6239cdeaa1195bf23a2a1d53b7982e87763ab0706d9bdf6686b52ab6e12a308

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Encoding

    Filesize

    64KB

    MD5

    73aa51e3b9bbe1c129c64c11e1f3b0e2

    SHA1

    d2b00635ac7bd65b131e571ff727d61aed2c1f20

    SHA256

    8294f9119b6073d0f830deaac65f3f8d47c1d654196b4b5dd7f56b3728d404db

    SHA512

    f8d33a6d887c2d41360ddc06cd71f71e5007b1b58cf99e74db95d41b4d41758b0f32d3d520d4643efbf164740c7d45911a600af043db82025427f3535c6ca78a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Epinions

    Filesize

    112KB

    MD5

    3b4d81abe994cd49de719b68a953d78c

    SHA1

    ea77bb52b4820b7abfaa510bda7cd14aa85929d9

    SHA256

    e66c6c168dbd5a8d552f230e0a7314355f6d72ed7623428769bf85dbb649f21b

    SHA512

    ea8814c9b77c56224ae0fc6b393d519cacf7e81050e21cd904cd50b9a4fe51e88c63ce4fc73583d85a4372e99a6e5c00e59f2c061537a87581d2d9fbcfc7838a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Halfcom

    Filesize

    133KB

    MD5

    0544c7badbe97c4d56e72d7d7242e98b

    SHA1

    9b117815db490af6d31d75772ec93b26b1330f3d

    SHA256

    333323a0e718c711ae6097df85a5c59f336698723c6aeb02dd184b78e3baaa06

    SHA512

    7ce51468881d12c925e989110096e46fd1eebc7a77cd483a9da9ed0c1b58c78c89c9a5865df62512446138116b24a7d7b70fa53b84c7176a7a4b0a1557678ca9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ingredients

    Filesize

    90KB

    MD5

    2adcadab494462fba495d5ce3706d5e3

    SHA1

    2ea7293d91cb152c793fe4d3e5d829dd6bb6ba64

    SHA256

    47fc6ac29d8fcd5b54f93126cbe669f40caf9d5741b64ce4b83942933e148864

    SHA512

    9ebdeb2323bdbebc97ff58e812e928445d5664f570e4d5be0ea6219af2a19f8122efdd9f85dba713b576d37a4c0a3076437ce5b12971c2e1b747f8f9f099bda3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Inner

    Filesize

    57KB

    MD5

    dfdd5dfc5e5c40fa85686921dbcc9ce2

    SHA1

    4da2e5a9609c1936573261c498b9d4f20191a67b

    SHA256

    eea452360928a61c788aa5c25aaad7c1beb2ed214a336fc74f469d5e9febf29d

    SHA512

    bd11468006656e01694396c8ee02188e4ad5a20e30b35ce49b02cdf1103343054cd18e494703fdd06df237788e166ac4a8cb7f01ef7e7ea21a44a5cd1089aa18

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Kit

    Filesize

    77KB

    MD5

    53a8aa9271206f34628122273cbfa8a0

    SHA1

    8287cc19f9eed1d3f8cf43e67e149601ecaf263a

    SHA256

    69139c3dc00b0c3db2ce4ded69c4571cf3fb5460d06d0afc6cc8aec8951585ff

    SHA512

    0c78cd217f1a40e467bb1241acd31e5ce8e1b57203e6fea5334972e141619276f6aa1fb0c5a64431dec2d2ef753a7ddcfaf92aa1a627e4a652d5d1d4746e3f1b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Memorial

    Filesize

    477KB

    MD5

    b094861fa938bedf7f31665429edbd3f

    SHA1

    34f7f7f994ee8bbe5d485224dae3a9cf54e619ee

    SHA256

    ec3fe76c5434b5a2ab018926eb2e4e831a6c050c328d047c1964505a6274e140

    SHA512

    45cc2bd22bf75d1a0002ec1f680edbb8505e414169b4f80e960aad86a7455abce52a19380a536800e20dda01dd0d7044bedf219e5cedfd4d3c0e4d886f8ac0bc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Motel

    Filesize

    15KB

    MD5

    2c068f885d810cd34c5f470703fff7bc

    SHA1

    b64de9c841cfafbc22a67d3d75e347f199ffc470

    SHA256

    248cd8cf8ec0ab284667a874fc5d2cd4bb92cbb3806dc9474086834eb5ee0720

    SHA512

    f7bfcccec497d0514eb7580d4add5b119a10e77412b617b3af4329f9a32886b8766cdea259af1aa7608ad3d690b16790836b86073dd4648aee54cabdf48f672b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Patient

    Filesize

    64KB

    MD5

    7b9d8bc02137a80208c6552147488b2d

    SHA1

    37409108155824a9d7f9a878925f0b09642d2310

    SHA256

    3859ea981318f558de97061df761f8750b5d6680c7e9d8eb7c7a86832b01c910

    SHA512

    f7c669a7ffa26f89d4cfe350050d8a4f9165b8100e47dba6c9a2e2579f8cb35b1575c5b5b36a875dc7e59232c2fb6b4d47395185aad6caaf0fbe046a78d7a8f7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Pike

    Filesize

    59KB

    MD5

    33425334f413ff941dbe56b47b3e0747

    SHA1

    656836d03682237892316251f342aff2d3a74811

    SHA256

    74ef38bec95ead303e5b824f44065930c5183d10206b6653a960e672ec374851

    SHA512

    4865e765ecb3c8fa799e27bcb9003b11848b8e0a88aa18ea7957bc959d829826a7b0c423b32adc19481a1826495e76afaaabd65eee5c9de179d449d1aefe63bc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Postage

    Filesize

    92KB

    MD5

    d0d3d3f8fa8e3aa72405d0fb9b1587ea

    SHA1

    c5e78f6bfa2c053c27db2f5ae70eb04814937d5c

    SHA256

    541d1303370a41bb377d3f28796ad1e1f4225e73b3ce324891d37250db8f7864

    SHA512

    f3019d48635de8a58f5f7ebdc4b56778ad7894ed3d077a359e3a551a34d867b5e91314ea5f58701ab8b178487e9b680792c4c348a1e7d4abd6463ef1a41defba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Propecia

    Filesize

    96KB

    MD5

    3dc43b59ebd8419fbe78840edf0f4948

    SHA1

    10b307d7333e03edc72629dc0a1b169be90ddb76

    SHA256

    7e37730b24244d097b74bdce7062a61556e18040d548cb3b818a440f267b1c8d

    SHA512

    c645d745e3390ed0d471057a6c816697c6fbdfaa0da5db92e09ff623ff729f4d57be5ad402dfa3e3f8de59bdc18b40a5d714a843248da52fe5cb7c3daf9458f0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Reception

    Filesize

    2KB

    MD5

    27c586be31c9542b70ab377e58a0f72a

    SHA1

    27412114d7836cc80f13c49ed19ec7946934834e

    SHA256

    cecf4a764e4e12fc614fa784c4a96cda7127636ac3484093b1089d5aafcdb432

    SHA512

    6b80ddf66cc514617cdf44c483d03bd657189a1329af70d30dc8018a7cc729bab81901987342198df2a180937348b383671b619e5e9f68ea58df408745aae179

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Remind

    Filesize

    55KB

    MD5

    8a73509163198a881058e44e07ba3875

    SHA1

    543bbcf5d4eba4bed5a2233fdc0032cacbaa3074

    SHA256

    709279d5a4e77e5a59d434a90c7f6006f17211dd7053c8dab7463e54c4ae74f5

    SHA512

    b0d432e0ffbf879de22592bd131d4b9eb7a99e4ddb55b2291cc13f31f08acc5804ad09b1db625f843c44b6823d56f6f85cc62f41c0d1af286cc09856b71cd858

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Riding

    Filesize

    23KB

    MD5

    61f93b2b59d9b35aa31f77e3cc7f4b65

    SHA1

    e05fe48381692d16884d979620e9d41b29abd7a4

    SHA256

    e689f665043b3723ace59e4b8b29c8741bfb0d5effce2c3d03945a62c2b0dee9

    SHA512

    c8f6e93f4b437988407a5649ffc9ee6819fa52ced04b628dfdad7fa2a8d0937a4c24f40b06688facb23be893070e78346c42f1cf256d81f1d561ed9f43e9eba9

  • C:\Users\Admin\AppData\Local\Temp\Cab143E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1460.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\312875\Tracked.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1788-76-0x0000000003780000-0x00000000037D6000-memory.dmp

    Filesize

    344KB

  • memory/1788-77-0x0000000003780000-0x00000000037D6000-memory.dmp

    Filesize

    344KB

  • memory/1788-75-0x0000000003780000-0x00000000037D6000-memory.dmp

    Filesize

    344KB

  • memory/1788-79-0x0000000003780000-0x00000000037D6000-memory.dmp

    Filesize

    344KB

  • memory/1788-78-0x0000000003780000-0x00000000037D6000-memory.dmp

    Filesize

    344KB