Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 00:11

General

  • Target

    crack wondershare dr.fone toolkit for pc 15.9.10.95 full crack.exe

  • Size

    807.2MB

  • MD5

    91ea85045bed32320ebc43dc0398afa1

  • SHA1

    9b7e8c769adcdd372006f0c89c869f7c49935218

  • SHA256

    40ff158b6248f773708b4c57d2a5e84f04dcb6eeec667c46569564b8b3e0f13d

  • SHA512

    98628e802375c65533a8ac33d87ef73241408a6de6693946b554eaabbb919aa289e38a4703f002f686f31e3208b0f70bf6cfd6fb645d190c6ef4cd813ec436ab

  • SSDEEP

    196608:26l95am32MjAw+rqqP47AMJicPHUqCA4liQ2nf0R5e6o/Zg68SfJgZA4E/c5lh+y:jUxMBhTQMOOWf+/0x4J

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://detailshaeje.cfd/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\crack wondershare dr.fone toolkit for pc 15.9.10.95 full crack.exe
    "C:\Users\Admin\AppData\Local\Temp\crack wondershare dr.fone toolkit for pc 15.9.10.95 full crack.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Optimize Optimize.cmd & Optimize.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1544
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3516
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2776
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4384
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 546325
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4012
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Learners
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1552
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Sleeps" Vessel
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5028
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 546325\Vault.com + Sandra + Filled + Ours + Egg + Circumstances + Small + Operating + Death + Inquiries + Reception 546325\Vault.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1564
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Cal + ..\Slightly + ..\Handed + ..\Uni + ..\Eco + ..\Chrome + ..\Melbourne E
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1968
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\546325\Vault.com
        Vault.com E
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\546325\Vault.com
          C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\546325\Vault.com toolkit for pc 15.9.10.95 full crack.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3984
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\546325\E

    Filesize

    483KB

    MD5

    df0f6568abc17bb254a1179ce06d8ac9

    SHA1

    e0bf28f35f5d1a88cdab86042c79ff649201df02

    SHA256

    5df73a3f5b7ba2af6d5ec60ff8b2269dda34cf6843f29f716cd94770b61bc0b7

    SHA512

    67d68309c9683c71d8fcbc680fd7a1403dc144be94f710022369f46bc7adca60dbc55cbe0785afacb37750bdd732e287d52dc2593ee313e75a0df76e127ada0d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\546325\Vault.com

    Filesize

    755B

    MD5

    05d654e595a0b52fa056972ba826fd58

    SHA1

    3cba2183dd8ba3cc6f334138f39fc5150f008253

    SHA256

    f5c37a706cdcf13a6e78fa66f53244692d67bcaabdfd34a948ef747683cd3658

    SHA512

    6567c8396356b41357a25a8db6d1048d1317e6bb9046cda70a0cd4b82eac8cf21876eac59aa2786cb6aca0795be265f55a3504b581d29ae4cae45d1d2b7617fb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\546325\Vault.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cal

    Filesize

    65KB

    MD5

    96817ed779dd7000a3f2137ed87189ed

    SHA1

    0d1a40df9467a594f2549706bf87f9f565688a45

    SHA256

    35329d71f708a5de45a920fcb078b65f65f53ae0836afb2d7c6299ea88ad208e

    SHA512

    41da8f5bb7373f74e1b1836d3e97a4dfd330b6e60625af466791579fcbdbbf56f371fa12228786988537359724f2d086c3d5a244f74880e685d140ace5de20a2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Chrome

    Filesize

    58KB

    MD5

    e5a4caa82d7869e676fcf78846fe983b

    SHA1

    dda4a6b84789971c05434f68afcb10377b3a0221

    SHA256

    95acee660862383146de220182fcfbfff6c8ad3b4ffdbf8f8966727da9ab7400

    SHA512

    6d03d3be56263ac3265ef23a5ef3f97a98e28091ea0c73b1e0fa190b7075318daf55e792a90a145310b856d339412d6c71d54b439fae2cfbb5a1eb1136c98ac9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Circumstances

    Filesize

    108KB

    MD5

    0165da60d34a2a363287ac64098b84b5

    SHA1

    2bf47ff8da6b5121a0e851277e8a9f2886259eab

    SHA256

    bca1e6fae3ea0bfd01335e45b5d77470d8d7b8ea6962ae1b28ff872146d753cc

    SHA512

    183ef257631bff9a7da89ea474620d576900d8927be3209bdcfa1f0f804195fb208395a446e77211cb49103fb18110586efd01be6de708863b2262762054a691

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Death

    Filesize

    147KB

    MD5

    b580ff0b1525303ae26f8bab6e2b2559

    SHA1

    ea41a7401acb5e7f56c421f425d9941b61072d26

    SHA256

    d3a6dd7515e8c2ff69c735f30e945b12d71f214f518a57547a2fbddb8ceab2ae

    SHA512

    55dc0cbb0eb19106bb9702a7384791d8f9403e5b78e3842d18357ee03e2602baff9a2253163c88e385da539892ec97edf5f20048a6adb4af1b96c809e0246433

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Eco

    Filesize

    86KB

    MD5

    8dee0d38486d2243886650bdd689a7e3

    SHA1

    eb0f8213ab752fc93010a9a7da9aec8673e9aa1b

    SHA256

    beb2d5364843791832fee351dc6db11c804911b816011e7818e8bfa424a84080

    SHA512

    bf7e8ade22da886ab3333ecfd1644c6153b8757afb8d4d249faad0d719b91eb41e4a6340969868865f00cc555dd6c7f263caf802a80d904f28cad8bf4ed28a7a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Egg

    Filesize

    92KB

    MD5

    3614631a01488b054482e032ac5dbf1a

    SHA1

    1953d0e5730bd08f7413418d554ffc824c9738a4

    SHA256

    9f7d76b6cc10b7a74569292347e6f89ad280da997c44acdf40525bb5c280a1b5

    SHA512

    f1bb65ef807acc271671d4f50254fcd63dbf636e910fe804c2b2bf3b3a986ae00eafe964996086e4ce15143b1ef3ac58a77a26d2565746956cd0ea05c2118221

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Filled

    Filesize

    149KB

    MD5

    f38bb3ab269c94305d56ab464ad936fa

    SHA1

    c156fc9e4efda5cc54f443738ee1a33930a2e6b7

    SHA256

    15a796044d37d1fb5b45aee9de903ca7407ddf7c29e80b52d93d950f9cdab7db

    SHA512

    db7a7e8f26c881bca7003aa4a3de6fd0081eecd0ed7a34c374be4488621442a8402cf20e3321da0cd0ddb663e894a4e3af89bca9ac1f69d3cf1bc4719dec3c5e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Handed

    Filesize

    66KB

    MD5

    2eb7f77a9873ac9cd3dc87694a8df572

    SHA1

    0f46a796ad77fdd2fcf0418b4a7dd14a4a334058

    SHA256

    ae6eea71eafd4bce8cb603353f9cddee2d123aa3a00b3f22a495aa8da21f28f2

    SHA512

    0c8a29bd4062e5aa4eb6a712d2a411e33356bafa3138b63def3e4549f1ce98d706f4194e959ae3b1f5f55037aea48630097bafdd135590dd781a81afc0f5904e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Inquiries

    Filesize

    64KB

    MD5

    69f962402be76f9a3ae3a106c36a3111

    SHA1

    28669b6c22dcef647f9ad54d4042703c6e7b4561

    SHA256

    e92fa0abfbb990aca0ec469e7c6b37ba2538429246b44cda3173eabd24b2aaa1

    SHA512

    1a9947f5c07978ad42fb1ca16b5155078c0bec82e8f8545d76b0283752a1f0aee451de27e00488107003b90e1988fc898f3b33a0f795c20e6f0a0ef4ca22df0b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Learners

    Filesize

    479KB

    MD5

    4580d0bfe95e1c4296275d41a686c76e

    SHA1

    4abc4ce9a2f0861d30b333f070de73403a22deea

    SHA256

    14d12dc7ea25a20312b4844641c45674ec3ceea0e0b427a70bf9665002035bf9

    SHA512

    5b69554cd46e066bb29a2f4e71d4236762b7678a477a14ad409ee957b996fa29854f63080a6d69e255edeb12304f0c6dfc8ad1e6d25a91bf1f13de5fbc925851

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Melbourne

    Filesize

    73KB

    MD5

    a4b84a58543f88c10d471a73e3ee8a88

    SHA1

    0b681670166272fc58d074e392362d9432260987

    SHA256

    8599719ffcd778c57096561523ec9d01a610ce8f1c9fb68f4bc4a5d9fbf8bbb5

    SHA512

    c3caa271b37bf631414205b3210cc695211a644127ae364c302b4720d2aff00fc1b8644b7b3265052fca600491d7707e4f2fa2cdadcf8b6cd824f0cbb85ebc71

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Operating

    Filesize

    52KB

    MD5

    81b641477a442d0acc40b65e61c97a1b

    SHA1

    065958c4c2b053a3167f843f85e1024d0b2e786a

    SHA256

    3f69411da3639774322ecb5c3847448d2a86f72cfd0c49bb8d00bacb1f97dbad

    SHA512

    1ea8d6568ff5cb12730a4d67ceedef7c95bfd62703f1224d20ea9c86256a304dada70d262fa4ab68e39e34dcf90ef102f63756feca29159bc41eefb7691ff2cb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Optimize

    Filesize

    13KB

    MD5

    25f5720a25088fc7efd740633e263de7

    SHA1

    748f7c422204bbccfec665bb9b1e66116ef27257

    SHA256

    c603f816c8d5bffc4254ba401f01e9855a578f4440657e68ca1a599ebdba5298

    SHA512

    1b8a7941670c8c9e32a090aba7dd8f4999b0ab97beca621a1e0953f221096cf1e17ba57223327e5109cae36aeccf370079a34093317c09a5554b2ccde537f9fd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ours

    Filesize

    71KB

    MD5

    a196bb04e630190537897872f4a70610

    SHA1

    8a6152c381b3f900d818b41c43a9722a3143b044

    SHA256

    a90590eb9462cdf0a50031d70d54a076facfa79b1059f123771d9fa7d57217b8

    SHA512

    7e13c576678f40d5a5b8a27ef397fda4d808cc07db345158cb65fc6bbe22ca0ab9db8c8feea8160ad0d3cc5f6ed23ab12bce736df7e94dc69014cc9261762116

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Reception

    Filesize

    22KB

    MD5

    4b756fdcca1fce3a4cedc3d9ca8a3df9

    SHA1

    cf80a81a8f449c1e126ae5590301aadc160df14d

    SHA256

    7f9772e958fbf7508a48e8260aacb381cb57dda73546ea226031431a70d974f9

    SHA512

    bfe633e43797d29d487a353e1bfa45f4d33d276ecaf9b7da7631ac13035fe0cb4306c2df134a6348f7a6685e6ad610c35caad438a344d9fa88b58ca8ba84ad2b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Sandra

    Filesize

    89KB

    MD5

    99fc2a087a974fca8a3340451df085b7

    SHA1

    75b3e73643606d419c393e90630772e423613fee

    SHA256

    df22b8906fad24405255347ff335be66fd021e817795970b845ccc09d766fe46

    SHA512

    701004f8379063e629da1098991bff91137e66a1a25e82bca8a4d98a948c7938dd8090705cea5c6022e51beaec198c2db1e48dcdcd3acaf4202a3c78e7a2d1fe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Slightly

    Filesize

    60KB

    MD5

    bb04ddae79d8f32c1629428f582b8f41

    SHA1

    ee8d11da5a575898f13cb166e89cd131cf039302

    SHA256

    2873a0db0bc4b1cec38a19ebf8cd959cab07f8bdcc91e3e64d8ef49265be26d0

    SHA512

    17288a3490e89a16d5789690e2375d075f9685c94c795554c4e75a3383265e7bb7eb70d9f8c794d5d6a7de82ce6b8cb1b469f00824bfc4fa31ce1a0454903c69

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Small

    Filesize

    130KB

    MD5

    4ff68398449417b6d5b4aa2482cfe7b8

    SHA1

    23dedd3d292c8ffadcc1811753598312e0d5a9cb

    SHA256

    6526ccb4d0f6c12a158538b43bb34750e7cc3755fadd1690efc331aa146c2941

    SHA512

    1a8979a0ef588381e73fc116276572b1591b5fb03d67f24911e0a3cd06c71bb026f5c7a64a84d7b658614b468bc5addf19f37d6045191e87948ad7f386f54077

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Uni

    Filesize

    75KB

    MD5

    f31ca5a0a4f2400fce2dae6dc5012fa1

    SHA1

    6778af6607cb2955ba1903167e6d6be6b8074be6

    SHA256

    413f2a41c139aec6ee974dad3f50cb85640909be2b25958a3011145b032f96d9

    SHA512

    1289e605c79542f40d56af8e6aba989145e01da23915bc818664c6a0b2686988c6552040d6ae311a568898e6c32eb90743b2ef40bc9fecae12571ebc62a1ce9b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Vessel

    Filesize

    761B

    MD5

    40fac3fba35d8d9482d54ac5da23c326

    SHA1

    ccae6a535db71fbd38c15865cd9710907bbd1d92

    SHA256

    9292149984974a6b6a10bda8ec38c65865f0e435b912c430c901d5250e78f202

    SHA512

    8df390f830712beeec4a55154211ac22f82c4621c2c568124b20ac5b3a20ed9e5efc37cb78f1098a9e5d1c37fba8b37029a596cc177d54e56b8dd73a16dc1059

  • memory/3984-71-0x00000000008A0000-0x00000000008F2000-memory.dmp

    Filesize

    328KB

  • memory/3984-72-0x00000000008A0000-0x00000000008F2000-memory.dmp

    Filesize

    328KB

  • memory/3984-74-0x00000000008A0000-0x00000000008F2000-memory.dmp

    Filesize

    328KB