Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2025, 00:27

General

  • Target

    Cleartones Everything/cleartones everything.exe

  • Size

    784.2MB

  • MD5

    ea965f92edd7cdae2127c38a9272a510

  • SHA1

    d692194f3184d7c97de12b60624f397afa306634

  • SHA256

    038bd5f9da2ee5b0684c3f0d660de014d06431a1ddfff16394b33396560ce1cc

  • SHA512

    0c14a38c62af7ef9250731d0d725e1e1784de6af42490c70c230f9781b69735f5b9e3c90193e6e67c022fa8b74e683f9d9f3eab6c46f2976e2daf032583a8249

  • SSDEEP

    393216:HWRpCKzYnlGGJjBeYH8n0oVJZsmW2pYUOt5ri+dM:HWRUPFJrM

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cleartones Everything\cleartones everything.exe
    "C:\Users\Admin\AppData\Local\Temp\Cleartones Everything\cleartones everything.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Portsmouth Portsmouth.cmd & Portsmouth.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2348
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2788
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2808
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2820
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 552526
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2748
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Simulations
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2736
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Recognised" Nominations
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2664
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 552526\Portland.com + Characteristics + Modeling + Ind + Kingdom + Heated + Securities + Irrigation + Twins + App + Compare + Wealth 552526\Portland.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Participant + ..\Old + ..\Ends + ..\Connect + ..\Fisheries + ..\Tablets + ..\Nationwide + ..\Vsnet E
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2568
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\552526\Portland.com
        Portland.com E
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1052
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2700

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\552526\E

          Filesize

          486KB

          MD5

          709f637ed80b635e3f1359d84977b98e

          SHA1

          48c3e4d4717b6e7c3e3d504f73cee97329f3a606

          SHA256

          0b03b42f9769715bd3b5384ccf55073d5369ac24e7ee84acdccd0da34f8a1bef

          SHA512

          ab13cd3beb03680f05171d4abc8c42d59a88ac4734872618f541bf43456e43b660bbc6083bb7149cad2a749a1f5668ebb0c51984b27f466a498d99655873de70

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\552526\Portland.com

          Filesize

          2KB

          MD5

          2d44b432dd9d7268ab56cb3d09f5e7bb

          SHA1

          38c2018b1ae588f30a94c648272d9a5d9651e2e3

          SHA256

          60ecda23a534ef6800be125ed36c4bc95142e2d31afb5602ea820b8b09f4f018

          SHA512

          a703e213902de6cca9840c92dd8df2760bcfea4984d4555c3987ad357ae1de89b26fd0526daf626215e9914ae8eb43835259e8fa9b4d9c6d26a803fe690d0a2f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\552526\Portland.com

          Filesize

          925KB

          MD5

          62d09f076e6e0240548c2f837536a46a

          SHA1

          26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

          SHA256

          1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

          SHA512

          32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\App

          Filesize

          58KB

          MD5

          c6635a04e48a3a15145742224ed3a014

          SHA1

          1271149731d10c933a843dcf8dccb388cebfcae7

          SHA256

          ed29423104db4e42bef30963f5b15e3134945eefe182c93db22cdbefc50b3c63

          SHA512

          2bb3a6b25e0346562cdd6f6c74a358ccd1325bf5d29ea8a7b2cf62fdb7466d3039875f993fd5d0fe3fd70f4cab538c8c61526760002f6f7f4ddb9612b7b29e19

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Characteristics

          Filesize

          138KB

          MD5

          de99c5b39f996d640144689cb11741f4

          SHA1

          1cc706c70fc191f3c4d97a7d7f99bb6aa885fdf0

          SHA256

          8e9fd20f4a487861218b3155356005e1eef0faa77082a48f379def97099acb60

          SHA512

          cc7e794a5d7555a57d0e1e147377fadd3e27e7f67cfbd218214e032f556aed426285161702efd2bfbd6b45dd36309e01a1f1e1d621da5433454b43af37c34491

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Compare

          Filesize

          61KB

          MD5

          a96c742556a48d9c3bdb3698e19db70c

          SHA1

          0a57d847c4dbd4164a695890b55031370ffcdd66

          SHA256

          1cfdf90b349c58d6b40c518a9c3a3dc87c20034639e0c41c5ccc6a5ebe8fd0f1

          SHA512

          fb6a1c253834a5b49923c9ed494d0f4ac81e3b53644bfccaeece2ca0eb2e170fa0a33c956638cdacb963fd0aca14a39bb24062e40e8af955baf0eaaa62c36e1d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Connect

          Filesize

          56KB

          MD5

          3c3f4ef4aae03e22dd2ecd42925f422a

          SHA1

          009fb549e6e74a41b400b922904e0ab5cec81442

          SHA256

          da444fffe9adea173d6a34c63a5184b39d8b364e397d703cf45dcc411f017b77

          SHA512

          66287935e2e9578be4304d1cdd9f522b354571feceb3baad20e6d530f013c75bb790f9013a14494323b7e97424f134dd53eee3f63c6eadbc25f19f624d184cb9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ends

          Filesize

          56KB

          MD5

          84fd2b0d12391a8ce73c49aed9d7d6bb

          SHA1

          d15efb67d5f1be2468c14498c3eb095825315e96

          SHA256

          a127c719f9b0441f90b51b8123f64ced3c9e44eb7bebf950af2969ae25ef6aec

          SHA512

          18e1ba8780699b9ebdf3f3b3325111c475367f79186c682c2688ffe81c9174566cb0c72d589bf622376ccecb805145a03df06747773907a7297972ac6d4eee32

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Fisheries

          Filesize

          61KB

          MD5

          7c8ffd4ee14d8e9af19e66d6a7455bf6

          SHA1

          776489474a386bc4b9a20cb9ee02d328b2142859

          SHA256

          4ae56d265ba691647226534c52e8fd00c238d54ffb85c9e0f5b3547ac8fcc1d4

          SHA512

          f405ad914e45ec800ea30d7ffd1944a7a9431e6e68880a5013740ee182647551680e23fef242e136c8628ad349ef935c93dfb6a02151103b5b77fe9cb630a6a4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Heated

          Filesize

          77KB

          MD5

          eea3df89eac51405f15dfb3f1ae7be81

          SHA1

          a9b39c76a03f397532e264bf96330e05658967b4

          SHA256

          9e6326d84ab7bd3b9cc74276480c398bd63de355344ebb1e3b793c5b29abc642

          SHA512

          aa65fdf62f38ce91f11aabaca7b99afa3e651ebf719bed72fac7c5861ce19e1fdf31cde651cdebf2d23b33a65c12b94ed1c25731382a963d9d06af586c190756

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ind

          Filesize

          68KB

          MD5

          7aceea23583421222b3f690a706e9381

          SHA1

          24ef4289d0a3aff8dea73e6de7c2a5dfeca45eb2

          SHA256

          16aadf5915fc8b51c8a85096ae0399733325540efb867c5b9c64d1df1b6998a5

          SHA512

          8bae766644021876048c298f8c27bef408d238e4d61487211681156c84050ea3ee289365d20ac530f44f05a4cb604a19d59239df8b891d98fa42af0f2a0d2769

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Irrigation

          Filesize

          70KB

          MD5

          a06b796822f7514dcc70762b858ee6d5

          SHA1

          fabafb04b3f78ac193588cff81ae465923a3ae65

          SHA256

          4f56020e79c1d926791b4db46b1fb5042022cdbc21219c890e36b700a27efb15

          SHA512

          1bd4c991ed45231efbc8729b06bda0e6e0055daa3fe50383eac8ea7b0f7007bb024b93eaee4985568bb7d1f32d81a0f346784d913b2a7bbe467a6d36a98effc8

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Kingdom

          Filesize

          85KB

          MD5

          3224b792c4cf03b7b012fddb8373b4e9

          SHA1

          3e17b589336e8bc13baa013c1e287b5c0d60b76f

          SHA256

          7698a145d5ed7df8dea306ec966cdf047bc0045a4067ac8fbbe72add97bc8d9c

          SHA512

          b88328a470f44b5dbe8f06ec01d3ed6cce53dcbd21c1d2b90586f81f7a6b3df2c3c58010ea86f29dc2f2862b9119d5a9cfb3f82d8acac2d9ce1e09937c58ec52

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Modeling

          Filesize

          138KB

          MD5

          e0351d0cb2ee5d349bb8164ea8c2d3c2

          SHA1

          179164048df87711cf5499bf6b8df6eec32061eb

          SHA256

          523d3627d08277efb9ef833cfe9167062c92b8cbd9f26a1e63558036e19e2de6

          SHA512

          b26974948afa9efbc01f5a7f3b5f6c9f76a2ae545ecd71e4a7a665d2896493150606f6c9c141409bf4f61bb1249d4b762b812bd0d91294f5eaafa8e763049d13

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nationwide

          Filesize

          71KB

          MD5

          5cff86b59267a592e5381b0b7388231e

          SHA1

          9a93903d0c44d7972bd91a0f8243d511e0f519b7

          SHA256

          d2040dfe9ef02d782ac64e80ad2df756ba6147847454c3bd48aebbd9b7c3b4ae

          SHA512

          0d9c796ee4ee97b96dba4421340d6d468eb924d823980d0e935f70575fe303e6aeedf365cf9dbe051ed86bcdfd0d37858a0fdac81013d1c61488cf0ea8d0154e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nominations

          Filesize

          2KB

          MD5

          38f5cffec0aab7d670c554f277b00b82

          SHA1

          4e001ea734583f7dabeee95af8f1104e408982c0

          SHA256

          2891b875f2a72a571e4f3fc848767ac58abdd8fded6fd2ab8f5541548df58504

          SHA512

          c297d0f75b6683c15a1cf30acfdcdd78cd9f731292220bd6227f26038cbce2b30c785b11e9f4c7e13e3667d70ff50f7d727a957766ea1068fdfecd0194641b4d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Old

          Filesize

          78KB

          MD5

          a780df5fdddbfaf0eef8f13fde04636f

          SHA1

          38753624ab3054a5ab1fd7928028033abf5d7da5

          SHA256

          a4b28c56a0b71d2539799d8ce3370a9972da75d39124f35307802b699b51eba3

          SHA512

          5b5ff3c729196f28c843b1446f0a83ff2224c69dc5a0be33f93ec21afc7cf8e4f4b3c1ec41a2d5dee1c4e45a23d066eb8f7c73b70d1dd5b7e3c3c2bd25a6c905

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Participant

          Filesize

          79KB

          MD5

          e16c1a47cb9ea6680a751f5dd0494554

          SHA1

          5e9838897400e927ce56b6d26a8223fe29dadecf

          SHA256

          ce6609939e67ea63e114ea17184f64667c19ab1ef79d425feb9305a3c13714c1

          SHA512

          b7643174f67aa2f0864fca13541d8c47362e4f5ab35dfecfe93521941af397ee117fcccf551026b794158e2c077e243cdadbc2d617d05c4bf90af732c6fcbb57

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Portsmouth

          Filesize

          18KB

          MD5

          9f60e4be439ad71a6387725ca5ffea12

          SHA1

          f0619b5e72e61a1f84f1b6cd8cdd4bea055199fc

          SHA256

          12eef0099d63ca3f0d0fa88c661d700baa51e5d6ceb10d85dff645dff5df2088

          SHA512

          8fef0aa18c8e1b3cc6638411135c7ec617ce44fc466aa5c3ad3ad8204790c7f0f4131e99cae8b72bd7e581a524b2cfcaa9d7d089a2f056b0e7190ddb6a7d2e7d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Securities

          Filesize

          51KB

          MD5

          5f15affe4461eb0033b83de69af12a2a

          SHA1

          a5244a0af22ea8ad3d5084d0e89a0ef936df4e49

          SHA256

          716d615dc2f3a700bd1e872738ee58942cc3f8517e94030ad670ceace00d6a2c

          SHA512

          7c560604b246a9b52159d9fc2ba590fc5c4ceb634be519fb723666020e070840ed63b50c248a9908652057b5fa15884c6373790445315de05cfe34b44fb29549

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Simulations

          Filesize

          478KB

          MD5

          94615786195ce2cf019b7cf9c85cbb3a

          SHA1

          c995483e5e3cf19db64df881efcbd72cc7ce909c

          SHA256

          bee83606277ab6cef6c2b345b4197791aea76db613a8d90ed710377f0f8d33e3

          SHA512

          9cf0a2665a3aaa5380c897a12fdaea6f002272ae68c512eb704c999d35a631257fe1c979aa411834228de2fc78e19801823da5b14d58856a091d08aa402b97df

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Tablets

          Filesize

          80KB

          MD5

          26d40060e3d54c91ec2932452a48c9ce

          SHA1

          80d8111778774e784e3a021893dcaa858c2dd6bb

          SHA256

          aac57e32eaf4b9f987c6852fd4bca672411a19fb0349ff53980f845f98f9d275

          SHA512

          8aafe6667b614be73fcd4e6f5cddc2602ccf45ba1a3216a2b1ed2f5d8b3a3a83702155dc16500c89aa8551729c5bb0dd3a1bf6f3a35638399bb42d0e277a320a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Twins

          Filesize

          56KB

          MD5

          27cf462b63758c61b72a58757e1d3f86

          SHA1

          e66be096d59a128e9b6e051010a364228e7f57ab

          SHA256

          3a6b6e82ae5709d24ae19a1351940f465d16bb3c61b97b25139a21c358323d0b

          SHA512

          4ac1fa2c1feef3d6c578ba9d6b4e1fe0d141810ad08c3098e30fdae5da8354fc79af0195c79859f58f737e63758eeffe998b10f8da5f25ea309b6cb29037f46c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Vsnet

          Filesize

          5KB

          MD5

          d61854bc0cbf1e9adcf2ae6239cf9c38

          SHA1

          5fcbc1252cd314af60426ac89ab2b0ac82439d9f

          SHA256

          5df8cec455034509ebb7385bcd3124ef5dab4f5b9a3d0b4c3903f7a5ab75a079

          SHA512

          9e0989680ea022b89a691cf903577074ccd9521dd6e4bfaf99790ffb293144c740a32f8fcecd52908adb349288ef7fbead11f013bcf229dba2d19eb2efd1a2c1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Wealth

          Filesize

          120KB

          MD5

          4b0c34f6decc1d37c35607a3fb0eebb5

          SHA1

          6fe0964e78600c1fa63059e7473f004de67c26fa

          SHA256

          c04b4ca222d6c8c1f514be8765cf6b97bb07d0f173c2795ded66ff3fe30096af

          SHA512

          cf6783fea31599772c1756ef6ca22d584a31c2674a42f396013d51923e27b6c2aeb8711e73cc29c1960693dbaf4ffc6d14f3bc6a2e7a2f26aadd22632863b3a6

        • C:\Users\Admin\AppData\Local\Temp\Cab2F0.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar321.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/1052-77-0x0000000003860000-0x00000000038B7000-memory.dmp

          Filesize

          348KB

        • memory/1052-81-0x0000000003860000-0x00000000038B7000-memory.dmp

          Filesize

          348KB

        • memory/1052-78-0x0000000003860000-0x00000000038B7000-memory.dmp

          Filesize

          348KB

        • memory/1052-80-0x0000000003860000-0x00000000038B7000-memory.dmp

          Filesize

          348KB

        • memory/1052-79-0x0000000003860000-0x00000000038B7000-memory.dmp

          Filesize

          348KB