Overview
overview
10Static
static
3AXE8SharedExpat.dll
windows7-x64
3AXE8SharedExpat.dll
windows10-2004-x64
3AdobeSync.exe
windows7-x64
10AdobeSync.exe
windows10-2004-x64
10BIB.dll
windows7-x64
3BIB.dll
windows10-2004-x64
3msvcp90.dll
windows7-x64
3msvcp90.dll
windows10-2004-x64
3msvcr90.dll
windows7-x64
3msvcr90.dll
windows10-2004-x64
3sqlite.dll
windows7-x64
3sqlite.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 00:03
Static task
static1
Behavioral task
behavioral1
Sample
AXE8SharedExpat.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
AXE8SharedExpat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AdobeSync.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
AdobeSync.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
BIB.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
BIB.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
msvcp90.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
msvcp90.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
msvcr90.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
msvcr90.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
sqlite.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
sqlite.dll
Resource
win10v2004-20241007-en
General
-
Target
AdobeSync.exe
-
Size
1.2MB
-
MD5
f778e9136ab0db9de9802a7043de50a7
-
SHA1
850dca074534a14fdb9ada6afaceea88558764e0
-
SHA256
90803a583e9f693de5e7b8a196832436f6f648b27fb82e55904c256f30cc8b3a
-
SHA512
cd6c5c3537f05ad5826d503e38b8e6ef2eaf668616bec15ba51ad3d81e0337a72779d7ca6af9e8ebee12d713891b30c0b73bf34718552bc9f4e7d8909b998156
-
SSDEEP
24576:+heavSigvk0vhkzswHD4/V3OQdnYKYc4wXUyuy1:qP710vezrj4dJYFYUyuy1
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 2240 AdobeSync.exe -
Loads dropped DLL 4 IoCs
pid Process 2688 AdobeSync.exe 2240 AdobeSync.exe 2240 AdobeSync.exe 2240 AdobeSync.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 2908 2240 AdobeSync.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2688 AdobeSync.exe 2240 AdobeSync.exe 2240 AdobeSync.exe 2908 cmd.exe 2908 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2240 AdobeSync.exe 2908 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2240 2688 AdobeSync.exe 30 PID 2688 wrote to memory of 2240 2688 AdobeSync.exe 30 PID 2688 wrote to memory of 2240 2688 AdobeSync.exe 30 PID 2688 wrote to memory of 2240 2688 AdobeSync.exe 30 PID 2240 wrote to memory of 2908 2240 AdobeSync.exe 31 PID 2240 wrote to memory of 2908 2240 AdobeSync.exe 31 PID 2240 wrote to memory of 2908 2240 AdobeSync.exe 31 PID 2240 wrote to memory of 2908 2240 AdobeSync.exe 31 PID 2240 wrote to memory of 2908 2240 AdobeSync.exe 31 PID 2908 wrote to memory of 2832 2908 cmd.exe 34 PID 2908 wrote to memory of 2832 2908 cmd.exe 34 PID 2908 wrote to memory of 2832 2908 cmd.exe 34 PID 2908 wrote to memory of 2832 2908 cmd.exe 34 PID 2908 wrote to memory of 2832 2908 cmd.exe 34 PID 2908 wrote to memory of 2832 2908 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\AdobeSync.exe"C:\Users\Admin\AppData\Local\Temp\AdobeSync.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\ultraadvanced\AdobeSync.exeC:\Users\Admin\AppData\Roaming\ultraadvanced\AdobeSync.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1023KB
MD51bd2def42eb239073f043e3971621428
SHA1746af515b3a2a41f718e8748abd3e67ab83431fa
SHA2568a54c3509c7d1f24369208f30e5e9b7d43ce832bbea197a32cc76f6f4df5a813
SHA51254c8e54f69b7e7c07d31444c86721b3220a7450b38771cd283ec777d3fe1de2fc824f612c6468a0b6f6031cf8ebeab4c509f6741b913f3d37eeffef6e95ab25a
-
Filesize
165KB
MD5c8c0cd5ae41f0ca14b008d1d367fc438
SHA1ea249f15b6cb7bd34c2b164a9a7de9d53faae579
SHA25685a6260a81c8fbc3897ae84199b0c19ad52c1aa20eccd16bc1bff87ab4232f0e
SHA512e3b4c2727a013a9e546926db9c8719fff02c99c5e37aabaf2d5e781e0c413e4ec5373518d5222b27a9d40055a09126ccd14188ad8eea57825197b794db974862
-
Filesize
107KB
MD5759d71fc9442ab5a9b5749c0f6c0c263
SHA107a68c6922d443eb9d6d445da18ae8a6d92f7ac6
SHA256109647f58e7e8386a4c025f2c8175a4d638e5c0e62768953390764010ea22a2e
SHA512e3efe66c76ea81285ba01b1978fdb3e807eb0bf2cfe0373bb6fef06f2fd7d9ddc3269acf0d87517cbf9bea5fa09b2703a03792491dc8265d26b724d7dca106c7
-
Filesize
783KB
MD5d577f2aec0dfaa1614db20ee110da000
SHA1131b1bf456b399140cfaa14e3bc3eafc1628cd02
SHA2568d21a1b5060fb8e601037bcfcee715cfae3dfb8412c2aa063bb0dff31f6ec427
SHA512837a6a456d7be965e85ef09181da2d912759769861d29ceb04974050b3caf5cbfce595747a7fc417c12f481791cce1260cf9e62b6fc3a623be0a893a42052d6f
-
Filesize
26KB
MD54983038214bad6dc024c52b6b38e1b25
SHA1a341ca52d4f57576380267de939e2c86e8673ab5
SHA256848300f74e3fac2a68ff57dd804c83aa017c89b74e66145614d597dd56aadddd
SHA512eeffda90fbd44d9f4407233d9881a55bbd6e8debecacff38c740b75c74bc588de0d3322fcf0d43d445ea79ab802348efb81a669beb77cd78da4f792ac2d5a62a
-
Filesize
243KB
MD5596439b3a9f9ea44ff28e2974f69ab07
SHA1a2074cd3d39045902f82a072455420ab7101a036
SHA2568cc91d57d45b46b3439eaa017bf1deb8e177f15245ba6f18ebcf2bd0a173a4f3
SHA5121de8d41fec0844999b88c0cb738aac71c0ae895a51e91f6465afaa864537e692e4576e6699b4976e62aa2c38ef9125d9aaf09a72acaa068a0c2b05d413af858a
-
Filesize
1.2MB
MD5f778e9136ab0db9de9802a7043de50a7
SHA1850dca074534a14fdb9ada6afaceea88558764e0
SHA25690803a583e9f693de5e7b8a196832436f6f648b27fb82e55904c256f30cc8b3a
SHA512cd6c5c3537f05ad5826d503e38b8e6ef2eaf668616bec15ba51ad3d81e0337a72779d7ca6af9e8ebee12d713891b30c0b73bf34718552bc9f4e7d8909b998156