Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 00:04

General

  • Target

    95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c.exe

  • Size

    350KB

  • MD5

    16bcf3bab9228210d4e684b13780acf7

  • SHA1

    05170af7e401c44c0570c313a60c01f5d952fda3

  • SHA256

    95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c

  • SHA512

    2f4c5768ca87d4b20bbd994c7aa0c2b743084e8eaa8750d28963e9172985440bf3d2d069cb366898919ca913d89326eb1916e297d13f3315702571f3745f7a7a

  • SSDEEP

    6144:S9jisABONZ19gGUAQYUZIC8iHjAxye4p3S4qjJ6yN8rGhyoFhNh9+GPbAczPDu:qWHWZnQnZYiHIyecDfO3h/DN6MkczPDu

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://fancywaxxers.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c.exe
    "C:\Users\Admin\AppData\Local\Temp\95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c.exe
      "C:\Users\Admin\AppData\Local\Temp\95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c.exe"
      2⤵
        PID:1788
      • C:\Users\Admin\AppData\Local\Temp\95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c.exe
        "C:\Users\Admin\AppData\Local\Temp\95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c.exe"
        2⤵
          PID:1424
        • C:\Users\Admin\AppData\Local\Temp\95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c.exe
          "C:\Users\Admin\AppData\Local\Temp\95819dae821f31e1525fc988bc6a78ab01610eeb8e83de8bccd9680658fff91c.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:2144
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 788
          2⤵
          • Program crash
          PID:4860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4280 -ip 4280
        1⤵
          PID:4756

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2144-4-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2144-6-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2144-8-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2144-9-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/4280-0-0x0000000074ECE000-0x0000000074ECF000-memory.dmp

          Filesize

          4KB

        • memory/4280-1-0x0000000000780000-0x00000000007E0000-memory.dmp

          Filesize

          384KB

        • memory/4280-2-0x0000000005690000-0x0000000005C34000-memory.dmp

          Filesize

          5.6MB

        • memory/4280-7-0x0000000074EC0000-0x0000000075670000-memory.dmp

          Filesize

          7.7MB