Analysis

  • max time kernel
    93s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 00:04

General

  • Target

    aa1e63845cbfcee49033a729fcecc2d61cdc2f41968813a45ad64946e8a2ec1f.msi

  • Size

    4.2MB

  • MD5

    93a70c58cbc42d4362fd4cc206d5a35e

  • SHA1

    f769777dec440d5e8900927b42d6c4232d6d58b7

  • SHA256

    aa1e63845cbfcee49033a729fcecc2d61cdc2f41968813a45ad64946e8a2ec1f

  • SHA512

    db54faa43d5fc83f7160edbda953ba763080f499d8ce20cc0502a357a564d1be60dc44ece4425f5ddfc0d4ce6e47cf5b7e79bf1dfa680ea98cf728191df28a23

  • SSDEEP

    98304:Fn3X3JlbT6t/B7ALNsrYr82OvJ2p9TSNV1+jjz:B3X33bT6dB76NsrYFcw+o

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\aa1e63845cbfcee49033a729fcecc2d61cdc2f41968813a45ad64946e8a2ec1f.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4592
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4808
      • C:\Users\Admin\AppData\Local\Limerick\iScrPaint.exe
        "C:\Users\Admin\AppData\Local\Limerick\iScrPaint.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:32
        • C:\Users\Admin\AppData\Roaming\NotepadLoadZC_test\iScrPaint.exe
          C:\Users\Admin\AppData\Roaming\NotepadLoadZC_test\iScrPaint.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2284
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3316
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1240
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57ec07.rbs

      Filesize

      8KB

      MD5

      424d830cf22f0cdfe41cdae150fdcfbf

      SHA1

      8e73e9b14e34bf367abee6b759ff7213e31ed2a8

      SHA256

      836cefab81e0a23972d09185d27cfae4253dba7b087548acda16f60ba4662607

      SHA512

      2685708a077e61f2647f6a39df52d36b68ac380009439816b576b45b534d8d9f678b3f7711d2e79578090f2af3c9c50aabe278d3c373651a2be57a65e9dfbed9

    • C:\Users\Admin\AppData\Local\Limerick\WebUI.dll

      Filesize

      7.6MB

      MD5

      d4ad539ff52c5af062bdd88deb9d08a9

      SHA1

      c4264de99b628fc9afd320ec47e004ef1ade1d54

      SHA256

      44e5c6ac6131bf6b55b9a4c0bd5db41b56da3efcf0797f044bc693abed28dbbd

      SHA512

      a87696e66564aba54311f49e06fb6948f51531a323dfceae5d3af4b62a140ab009429853e72124ecb03058a0e85c5277b3329cb52f9c3b034f840eee15a45904

    • C:\Users\Admin\AppData\Local\Limerick\cajun.sql

      Filesize

      43KB

      MD5

      10d06a63ea6f430da50e26ed3441ea1b

      SHA1

      15f43b1d9a5723c6851db5de307df3f0b220a972

      SHA256

      8a58cca115c3e3c1afd2ba4c4af776306f3b4dbfd6d16704c180d60dd192e40a

      SHA512

      9669dccc63440c9942a7a13b4f715c8dc65dbb11482d0144c4b7dcbe451b9af0f2c9f894cbc186cc8880b6b68fc70e5191bf54faa4e65e8dff0662afdb21bda5

    • C:\Users\Admin\AppData\Local\Limerick\iScrPaint.exe

      Filesize

      1.8MB

      MD5

      098ac4621ee0e855e0710710736c2955

      SHA1

      ce7b88657c3449d5d05591314aaa43bd3e32bdaa

      SHA256

      46afbf1cbd2e1b5e108c133d4079faddc7347231b0c48566fd967a3070745e7f

      SHA512

      3042785b81bd18b641f0a2b5d8aec8ef86f9bf1269421fb96d1db35a913e744eaff16d9da7a02c8001435d59befb9f26bc0bbfa6e794811abf4282ed68b185fe

    • C:\Users\Admin\AppData\Local\Limerick\jaculator.app

      Filesize

      799KB

      MD5

      eaed4e7f6c2a9d9558061db4f88b6083

      SHA1

      0992fe807fb82aa4a4cc6a2eebb76346222643f9

      SHA256

      b6b3c597d404fe24f1f87f1fe5b2cae0b6476e796c6acac1ada9ed02ede1ec07

      SHA512

      c42ea74bbb9276cc671f9635d8f4df9365d95b43c0d108c02c223a40765df517549a2332c3c427b09ef74d0e7b36a1340dbb733dd4bd14d1c8c2099ce0e5cfa9

    • C:\Users\Admin\AppData\Local\Temp\a0be512a

      Filesize

      1.0MB

      MD5

      5e9f5d3fbc8bb41cfbd148cc33fde47e

      SHA1

      ead65180bc04e5883d67ca8a4a2ffcab2c42dfea

      SHA256

      98a61df0b5f14e4ee2e5e9eb9fc6f74c6dd6151a3b18830e44c415caa7280bde

      SHA512

      584392245246cfdac4b2ddb7ef276e967aee06968bb2346da78723a59db4add87bbfc0ef89dfa4f59fa5e028af4ed0f2709176179d0cdce335ca0614f71b011d

    • C:\Windows\Installer\e57ec06.msi

      Filesize

      4.2MB

      MD5

      93a70c58cbc42d4362fd4cc206d5a35e

      SHA1

      f769777dec440d5e8900927b42d6c4232d6d58b7

      SHA256

      aa1e63845cbfcee49033a729fcecc2d61cdc2f41968813a45ad64946e8a2ec1f

      SHA512

      db54faa43d5fc83f7160edbda953ba763080f499d8ce20cc0502a357a564d1be60dc44ece4425f5ddfc0d4ce6e47cf5b7e79bf1dfa680ea98cf728191df28a23

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      f2e6382871d6b055645a909c457799ff

      SHA1

      952bb5509836895c8d2c70b95927f51a94d5a515

      SHA256

      9fe5283f91dd8030f175b3282d1c1adf9873559603d0d3515c9c2a4b362bb051

      SHA512

      f39d46c270f73d1c0e8a9cb33bf43a89087b422f5adb410d7bfd93fe572c9e82d8e8768801dfb287f638c39a698ae9f6b51513a80f66d31677e3f5676cadf062

    • \??\Volume{1541411d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{8607c7f3-26df-43d2-924c-d7070edf2101}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      86fd104d75833ad2357c3266858c90e5

      SHA1

      3c3260e2008b030bde59caac8beef96feaa79088

      SHA256

      3e64ab8c96113ef07904eb7e85abf140b6edc9725ef94179073cd7af221a32af

      SHA512

      4280e73fa3ffe1ebdda5e860a4293a9e735480c77cd240f28445e129cf25ada81c00351f239d6d6b03091530accb0d7273c4bc03566649f124bd0a47029807e8

    • memory/32-40-0x0000000000400000-0x000000000061B000-memory.dmp

      Filesize

      2.1MB

    • memory/32-33-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

      Filesize

      2.0MB

    • memory/32-32-0x0000000075040000-0x00000000751BB000-memory.dmp

      Filesize

      1.5MB

    • memory/1240-57-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

      Filesize

      2.0MB

    • memory/1240-58-0x0000000000130000-0x000000000018C000-memory.dmp

      Filesize

      368KB

    • memory/1240-61-0x0000000000130000-0x000000000018C000-memory.dmp

      Filesize

      368KB

    • memory/2284-46-0x0000000075040000-0x00000000751BB000-memory.dmp

      Filesize

      1.5MB

    • memory/2284-47-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

      Filesize

      2.0MB

    • memory/2284-48-0x0000000075040000-0x00000000751BB000-memory.dmp

      Filesize

      1.5MB

    • memory/3316-52-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3316-55-0x0000000075040000-0x00000000751BB000-memory.dmp

      Filesize

      1.5MB