Analysis

  • max time kernel
    91s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 00:27

General

  • Target

    Cleartones Everything/cleartones everything.exe

  • Size

    784.2MB

  • MD5

    ea965f92edd7cdae2127c38a9272a510

  • SHA1

    d692194f3184d7c97de12b60624f397afa306634

  • SHA256

    038bd5f9da2ee5b0684c3f0d660de014d06431a1ddfff16394b33396560ce1cc

  • SHA512

    0c14a38c62af7ef9250731d0d725e1e1784de6af42490c70c230f9781b69735f5b9e3c90193e6e67c022fa8b74e683f9d9f3eab6c46f2976e2daf032583a8249

  • SSDEEP

    393216:HWRpCKzYnlGGJjBeYH8n0oVJZsmW2pYUOt5ri+dM:HWRUPFJrM

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cleartones Everything\cleartones everything.exe
    "C:\Users\Admin\AppData\Local\Temp\Cleartones Everything\cleartones everything.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Portsmouth Portsmouth.cmd & Portsmouth.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4760
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5040
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2712
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2392
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1020
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 552526
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4244
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Simulations
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3256
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Recognised" Nominations
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4036
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 552526\Portland.com + Characteristics + Modeling + Ind + Kingdom + Heated + Securities + Irrigation + Twins + App + Compare + Wealth 552526\Portland.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3724
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Participant + ..\Old + ..\Ends + ..\Connect + ..\Fisheries + ..\Tablets + ..\Nationwide + ..\Vsnet E
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3220
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\552526\Portland.com
        Portland.com E
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:996
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\552526\E

    Filesize

    486KB

    MD5

    709f637ed80b635e3f1359d84977b98e

    SHA1

    48c3e4d4717b6e7c3e3d504f73cee97329f3a606

    SHA256

    0b03b42f9769715bd3b5384ccf55073d5369ac24e7ee84acdccd0da34f8a1bef

    SHA512

    ab13cd3beb03680f05171d4abc8c42d59a88ac4734872618f541bf43456e43b660bbc6083bb7149cad2a749a1f5668ebb0c51984b27f466a498d99655873de70

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\552526\Portland.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\App

    Filesize

    58KB

    MD5

    c6635a04e48a3a15145742224ed3a014

    SHA1

    1271149731d10c933a843dcf8dccb388cebfcae7

    SHA256

    ed29423104db4e42bef30963f5b15e3134945eefe182c93db22cdbefc50b3c63

    SHA512

    2bb3a6b25e0346562cdd6f6c74a358ccd1325bf5d29ea8a7b2cf62fdb7466d3039875f993fd5d0fe3fd70f4cab538c8c61526760002f6f7f4ddb9612b7b29e19

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Characteristics

    Filesize

    138KB

    MD5

    de99c5b39f996d640144689cb11741f4

    SHA1

    1cc706c70fc191f3c4d97a7d7f99bb6aa885fdf0

    SHA256

    8e9fd20f4a487861218b3155356005e1eef0faa77082a48f379def97099acb60

    SHA512

    cc7e794a5d7555a57d0e1e147377fadd3e27e7f67cfbd218214e032f556aed426285161702efd2bfbd6b45dd36309e01a1f1e1d621da5433454b43af37c34491

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Compare

    Filesize

    61KB

    MD5

    a96c742556a48d9c3bdb3698e19db70c

    SHA1

    0a57d847c4dbd4164a695890b55031370ffcdd66

    SHA256

    1cfdf90b349c58d6b40c518a9c3a3dc87c20034639e0c41c5ccc6a5ebe8fd0f1

    SHA512

    fb6a1c253834a5b49923c9ed494d0f4ac81e3b53644bfccaeece2ca0eb2e170fa0a33c956638cdacb963fd0aca14a39bb24062e40e8af955baf0eaaa62c36e1d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Connect

    Filesize

    56KB

    MD5

    3c3f4ef4aae03e22dd2ecd42925f422a

    SHA1

    009fb549e6e74a41b400b922904e0ab5cec81442

    SHA256

    da444fffe9adea173d6a34c63a5184b39d8b364e397d703cf45dcc411f017b77

    SHA512

    66287935e2e9578be4304d1cdd9f522b354571feceb3baad20e6d530f013c75bb790f9013a14494323b7e97424f134dd53eee3f63c6eadbc25f19f624d184cb9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ends

    Filesize

    56KB

    MD5

    84fd2b0d12391a8ce73c49aed9d7d6bb

    SHA1

    d15efb67d5f1be2468c14498c3eb095825315e96

    SHA256

    a127c719f9b0441f90b51b8123f64ced3c9e44eb7bebf950af2969ae25ef6aec

    SHA512

    18e1ba8780699b9ebdf3f3b3325111c475367f79186c682c2688ffe81c9174566cb0c72d589bf622376ccecb805145a03df06747773907a7297972ac6d4eee32

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Fisheries

    Filesize

    61KB

    MD5

    7c8ffd4ee14d8e9af19e66d6a7455bf6

    SHA1

    776489474a386bc4b9a20cb9ee02d328b2142859

    SHA256

    4ae56d265ba691647226534c52e8fd00c238d54ffb85c9e0f5b3547ac8fcc1d4

    SHA512

    f405ad914e45ec800ea30d7ffd1944a7a9431e6e68880a5013740ee182647551680e23fef242e136c8628ad349ef935c93dfb6a02151103b5b77fe9cb630a6a4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Heated

    Filesize

    77KB

    MD5

    eea3df89eac51405f15dfb3f1ae7be81

    SHA1

    a9b39c76a03f397532e264bf96330e05658967b4

    SHA256

    9e6326d84ab7bd3b9cc74276480c398bd63de355344ebb1e3b793c5b29abc642

    SHA512

    aa65fdf62f38ce91f11aabaca7b99afa3e651ebf719bed72fac7c5861ce19e1fdf31cde651cdebf2d23b33a65c12b94ed1c25731382a963d9d06af586c190756

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ind

    Filesize

    68KB

    MD5

    7aceea23583421222b3f690a706e9381

    SHA1

    24ef4289d0a3aff8dea73e6de7c2a5dfeca45eb2

    SHA256

    16aadf5915fc8b51c8a85096ae0399733325540efb867c5b9c64d1df1b6998a5

    SHA512

    8bae766644021876048c298f8c27bef408d238e4d61487211681156c84050ea3ee289365d20ac530f44f05a4cb604a19d59239df8b891d98fa42af0f2a0d2769

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Irrigation

    Filesize

    70KB

    MD5

    a06b796822f7514dcc70762b858ee6d5

    SHA1

    fabafb04b3f78ac193588cff81ae465923a3ae65

    SHA256

    4f56020e79c1d926791b4db46b1fb5042022cdbc21219c890e36b700a27efb15

    SHA512

    1bd4c991ed45231efbc8729b06bda0e6e0055daa3fe50383eac8ea7b0f7007bb024b93eaee4985568bb7d1f32d81a0f346784d913b2a7bbe467a6d36a98effc8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Kingdom

    Filesize

    85KB

    MD5

    3224b792c4cf03b7b012fddb8373b4e9

    SHA1

    3e17b589336e8bc13baa013c1e287b5c0d60b76f

    SHA256

    7698a145d5ed7df8dea306ec966cdf047bc0045a4067ac8fbbe72add97bc8d9c

    SHA512

    b88328a470f44b5dbe8f06ec01d3ed6cce53dcbd21c1d2b90586f81f7a6b3df2c3c58010ea86f29dc2f2862b9119d5a9cfb3f82d8acac2d9ce1e09937c58ec52

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Modeling

    Filesize

    138KB

    MD5

    e0351d0cb2ee5d349bb8164ea8c2d3c2

    SHA1

    179164048df87711cf5499bf6b8df6eec32061eb

    SHA256

    523d3627d08277efb9ef833cfe9167062c92b8cbd9f26a1e63558036e19e2de6

    SHA512

    b26974948afa9efbc01f5a7f3b5f6c9f76a2ae545ecd71e4a7a665d2896493150606f6c9c141409bf4f61bb1249d4b762b812bd0d91294f5eaafa8e763049d13

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Nationwide

    Filesize

    71KB

    MD5

    5cff86b59267a592e5381b0b7388231e

    SHA1

    9a93903d0c44d7972bd91a0f8243d511e0f519b7

    SHA256

    d2040dfe9ef02d782ac64e80ad2df756ba6147847454c3bd48aebbd9b7c3b4ae

    SHA512

    0d9c796ee4ee97b96dba4421340d6d468eb924d823980d0e935f70575fe303e6aeedf365cf9dbe051ed86bcdfd0d37858a0fdac81013d1c61488cf0ea8d0154e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Nominations

    Filesize

    2KB

    MD5

    38f5cffec0aab7d670c554f277b00b82

    SHA1

    4e001ea734583f7dabeee95af8f1104e408982c0

    SHA256

    2891b875f2a72a571e4f3fc848767ac58abdd8fded6fd2ab8f5541548df58504

    SHA512

    c297d0f75b6683c15a1cf30acfdcdd78cd9f731292220bd6227f26038cbce2b30c785b11e9f4c7e13e3667d70ff50f7d727a957766ea1068fdfecd0194641b4d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Old

    Filesize

    78KB

    MD5

    a780df5fdddbfaf0eef8f13fde04636f

    SHA1

    38753624ab3054a5ab1fd7928028033abf5d7da5

    SHA256

    a4b28c56a0b71d2539799d8ce3370a9972da75d39124f35307802b699b51eba3

    SHA512

    5b5ff3c729196f28c843b1446f0a83ff2224c69dc5a0be33f93ec21afc7cf8e4f4b3c1ec41a2d5dee1c4e45a23d066eb8f7c73b70d1dd5b7e3c3c2bd25a6c905

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Participant

    Filesize

    79KB

    MD5

    e16c1a47cb9ea6680a751f5dd0494554

    SHA1

    5e9838897400e927ce56b6d26a8223fe29dadecf

    SHA256

    ce6609939e67ea63e114ea17184f64667c19ab1ef79d425feb9305a3c13714c1

    SHA512

    b7643174f67aa2f0864fca13541d8c47362e4f5ab35dfecfe93521941af397ee117fcccf551026b794158e2c077e243cdadbc2d617d05c4bf90af732c6fcbb57

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Portsmouth

    Filesize

    18KB

    MD5

    9f60e4be439ad71a6387725ca5ffea12

    SHA1

    f0619b5e72e61a1f84f1b6cd8cdd4bea055199fc

    SHA256

    12eef0099d63ca3f0d0fa88c661d700baa51e5d6ceb10d85dff645dff5df2088

    SHA512

    8fef0aa18c8e1b3cc6638411135c7ec617ce44fc466aa5c3ad3ad8204790c7f0f4131e99cae8b72bd7e581a524b2cfcaa9d7d089a2f056b0e7190ddb6a7d2e7d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Securities

    Filesize

    51KB

    MD5

    5f15affe4461eb0033b83de69af12a2a

    SHA1

    a5244a0af22ea8ad3d5084d0e89a0ef936df4e49

    SHA256

    716d615dc2f3a700bd1e872738ee58942cc3f8517e94030ad670ceace00d6a2c

    SHA512

    7c560604b246a9b52159d9fc2ba590fc5c4ceb634be519fb723666020e070840ed63b50c248a9908652057b5fa15884c6373790445315de05cfe34b44fb29549

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Simulations

    Filesize

    478KB

    MD5

    94615786195ce2cf019b7cf9c85cbb3a

    SHA1

    c995483e5e3cf19db64df881efcbd72cc7ce909c

    SHA256

    bee83606277ab6cef6c2b345b4197791aea76db613a8d90ed710377f0f8d33e3

    SHA512

    9cf0a2665a3aaa5380c897a12fdaea6f002272ae68c512eb704c999d35a631257fe1c979aa411834228de2fc78e19801823da5b14d58856a091d08aa402b97df

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Tablets

    Filesize

    80KB

    MD5

    26d40060e3d54c91ec2932452a48c9ce

    SHA1

    80d8111778774e784e3a021893dcaa858c2dd6bb

    SHA256

    aac57e32eaf4b9f987c6852fd4bca672411a19fb0349ff53980f845f98f9d275

    SHA512

    8aafe6667b614be73fcd4e6f5cddc2602ccf45ba1a3216a2b1ed2f5d8b3a3a83702155dc16500c89aa8551729c5bb0dd3a1bf6f3a35638399bb42d0e277a320a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Twins

    Filesize

    56KB

    MD5

    27cf462b63758c61b72a58757e1d3f86

    SHA1

    e66be096d59a128e9b6e051010a364228e7f57ab

    SHA256

    3a6b6e82ae5709d24ae19a1351940f465d16bb3c61b97b25139a21c358323d0b

    SHA512

    4ac1fa2c1feef3d6c578ba9d6b4e1fe0d141810ad08c3098e30fdae5da8354fc79af0195c79859f58f737e63758eeffe998b10f8da5f25ea309b6cb29037f46c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Vsnet

    Filesize

    5KB

    MD5

    d61854bc0cbf1e9adcf2ae6239cf9c38

    SHA1

    5fcbc1252cd314af60426ac89ab2b0ac82439d9f

    SHA256

    5df8cec455034509ebb7385bcd3124ef5dab4f5b9a3d0b4c3903f7a5ab75a079

    SHA512

    9e0989680ea022b89a691cf903577074ccd9521dd6e4bfaf99790ffb293144c740a32f8fcecd52908adb349288ef7fbead11f013bcf229dba2d19eb2efd1a2c1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Wealth

    Filesize

    120KB

    MD5

    4b0c34f6decc1d37c35607a3fb0eebb5

    SHA1

    6fe0964e78600c1fa63059e7473f004de67c26fa

    SHA256

    c04b4ca222d6c8c1f514be8765cf6b97bb07d0f173c2795ded66ff3fe30096af

    SHA512

    cf6783fea31599772c1756ef6ca22d584a31c2674a42f396013d51923e27b6c2aeb8711e73cc29c1960693dbaf4ffc6d14f3bc6a2e7a2f26aadd22632863b3a6

  • memory/996-76-0x0000000004440000-0x0000000004497000-memory.dmp

    Filesize

    348KB

  • memory/996-77-0x0000000004440000-0x0000000004497000-memory.dmp

    Filesize

    348KB

  • memory/996-78-0x0000000004440000-0x0000000004497000-memory.dmp

    Filesize

    348KB

  • memory/996-79-0x0000000004440000-0x0000000004497000-memory.dmp

    Filesize

    348KB

  • memory/996-80-0x0000000004440000-0x0000000004497000-memory.dmp

    Filesize

    348KB