Overview
overview
10Static
static
3AXE8SharedExpat.dll
windows7-x64
3AXE8SharedExpat.dll
windows10-2004-x64
3AdobeSync.exe
windows7-x64
10AdobeSync.exe
windows10-2004-x64
10BIB.dll
windows7-x64
3BIB.dll
windows10-2004-x64
3msvcp90.dll
windows7-x64
3msvcp90.dll
windows10-2004-x64
3msvcr90.dll
windows7-x64
3msvcr90.dll
windows10-2004-x64
3sqlite.dll
windows7-x64
3sqlite.dll
windows10-2004-x64
3Analysis
-
max time kernel
96s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 00:03
Static task
static1
Behavioral task
behavioral1
Sample
AXE8SharedExpat.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
AXE8SharedExpat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AdobeSync.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
AdobeSync.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
BIB.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
BIB.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
msvcp90.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
msvcp90.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
msvcr90.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
msvcr90.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
sqlite.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
sqlite.dll
Resource
win10v2004-20241007-en
General
-
Target
AdobeSync.exe
-
Size
1.2MB
-
MD5
f778e9136ab0db9de9802a7043de50a7
-
SHA1
850dca074534a14fdb9ada6afaceea88558764e0
-
SHA256
90803a583e9f693de5e7b8a196832436f6f648b27fb82e55904c256f30cc8b3a
-
SHA512
cd6c5c3537f05ad5826d503e38b8e6ef2eaf668616bec15ba51ad3d81e0337a72779d7ca6af9e8ebee12d713891b30c0b73bf34718552bc9f4e7d8909b998156
-
SSDEEP
24576:+heavSigvk0vhkzswHD4/V3OQdnYKYc4wXUyuy1:qP710vezrj4dJYFYUyuy1
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 2508 AdobeSync.exe -
Loads dropped DLL 3 IoCs
pid Process 2508 AdobeSync.exe 2508 AdobeSync.exe 2508 AdobeSync.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2508 set thread context of 3816 2508 AdobeSync.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4528 AdobeSync.exe 2508 AdobeSync.exe 2508 AdobeSync.exe 3816 cmd.exe 3816 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2508 AdobeSync.exe 3816 cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4528 wrote to memory of 2508 4528 AdobeSync.exe 83 PID 4528 wrote to memory of 2508 4528 AdobeSync.exe 83 PID 4528 wrote to memory of 2508 4528 AdobeSync.exe 83 PID 2508 wrote to memory of 3816 2508 AdobeSync.exe 84 PID 2508 wrote to memory of 3816 2508 AdobeSync.exe 84 PID 2508 wrote to memory of 3816 2508 AdobeSync.exe 84 PID 2508 wrote to memory of 3816 2508 AdobeSync.exe 84 PID 3816 wrote to memory of 3208 3816 cmd.exe 99 PID 3816 wrote to memory of 3208 3816 cmd.exe 99 PID 3816 wrote to memory of 3208 3816 cmd.exe 99 PID 3816 wrote to memory of 3208 3816 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\AdobeSync.exe"C:\Users\Admin\AppData\Local\Temp\AdobeSync.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Roaming\ultraadvanced\AdobeSync.exeC:\Users\Admin\AppData\Roaming\ultraadvanced\AdobeSync.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023KB
MD51115ad7dd428cea5beec669e986bf22a
SHA1eedd7b2620661551be7f9ad82872601faac983c1
SHA2569161083a2bb5cbf2e517eea9dabce9fe20517721512ca97cead1f5cf1ec67374
SHA5126d15e53d2e7c38c1bc1509961dae20dc940d507533bcdf5999a9c8e325ced142f9b938a1f30442091c63b2ac17a62e71f51cee2d492d2b09e64b0ad15fd240aa
-
Filesize
165KB
MD5c8c0cd5ae41f0ca14b008d1d367fc438
SHA1ea249f15b6cb7bd34c2b164a9a7de9d53faae579
SHA25685a6260a81c8fbc3897ae84199b0c19ad52c1aa20eccd16bc1bff87ab4232f0e
SHA512e3b4c2727a013a9e546926db9c8719fff02c99c5e37aabaf2d5e781e0c413e4ec5373518d5222b27a9d40055a09126ccd14188ad8eea57825197b794db974862
-
Filesize
1.2MB
MD5f778e9136ab0db9de9802a7043de50a7
SHA1850dca074534a14fdb9ada6afaceea88558764e0
SHA25690803a583e9f693de5e7b8a196832436f6f648b27fb82e55904c256f30cc8b3a
SHA512cd6c5c3537f05ad5826d503e38b8e6ef2eaf668616bec15ba51ad3d81e0337a72779d7ca6af9e8ebee12d713891b30c0b73bf34718552bc9f4e7d8909b998156
-
Filesize
107KB
MD5759d71fc9442ab5a9b5749c0f6c0c263
SHA107a68c6922d443eb9d6d445da18ae8a6d92f7ac6
SHA256109647f58e7e8386a4c025f2c8175a4d638e5c0e62768953390764010ea22a2e
SHA512e3efe66c76ea81285ba01b1978fdb3e807eb0bf2cfe0373bb6fef06f2fd7d9ddc3269acf0d87517cbf9bea5fa09b2703a03792491dc8265d26b724d7dca106c7
-
Filesize
783KB
MD5d577f2aec0dfaa1614db20ee110da000
SHA1131b1bf456b399140cfaa14e3bc3eafc1628cd02
SHA2568d21a1b5060fb8e601037bcfcee715cfae3dfb8412c2aa063bb0dff31f6ec427
SHA512837a6a456d7be965e85ef09181da2d912759769861d29ceb04974050b3caf5cbfce595747a7fc417c12f481791cce1260cf9e62b6fc3a623be0a893a42052d6f
-
Filesize
26KB
MD54983038214bad6dc024c52b6b38e1b25
SHA1a341ca52d4f57576380267de939e2c86e8673ab5
SHA256848300f74e3fac2a68ff57dd804c83aa017c89b74e66145614d597dd56aadddd
SHA512eeffda90fbd44d9f4407233d9881a55bbd6e8debecacff38c740b75c74bc588de0d3322fcf0d43d445ea79ab802348efb81a669beb77cd78da4f792ac2d5a62a
-
Filesize
243KB
MD5596439b3a9f9ea44ff28e2974f69ab07
SHA1a2074cd3d39045902f82a072455420ab7101a036
SHA2568cc91d57d45b46b3439eaa017bf1deb8e177f15245ba6f18ebcf2bd0a173a4f3
SHA5121de8d41fec0844999b88c0cb738aac71c0ae895a51e91f6465afaa864537e692e4576e6699b4976e62aa2c38ef9125d9aaf09a72acaa068a0c2b05d413af858a