Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 01:01

General

  • Target

    2f02e100e26ddc58ee26a2f4e7f6116f79405cd7baba4c69abd799a119a836d0.exe

  • Size

    1.3MB

  • MD5

    12fc06a5be478bd7c50a43ed8f0752ea

  • SHA1

    db3375bbff1e505e058c7f4c2d9d9231a3361149

  • SHA256

    2f02e100e26ddc58ee26a2f4e7f6116f79405cd7baba4c69abd799a119a836d0

  • SHA512

    81e033dadf5fe2447b347d6271189c8e8a5bf036c1926c43bac0421845c34fd75fdd97ab8f93c9804e8f4b9fbf9d9977485ba27a835bb74a5b4b82da48bd7d13

  • SSDEEP

    24576:q8kFazOV+NtfVngALFlitdnDyVgmAUo/T4Xg+Iv:2FGk+NtNTvi747ASVi

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://brendon-sharjen.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f02e100e26ddc58ee26a2f4e7f6116f79405cd7baba4c69abd799a119a836d0.exe
    "C:\Users\Admin\AppData\Local\Temp\2f02e100e26ddc58ee26a2f4e7f6116f79405cd7baba4c69abd799a119a836d0.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:276
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Six Six.cmd & Six.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1632
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2732
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2744
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2756
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 40798
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2740
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Referred
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2696
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "WIDESCREEN" Trip
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2552
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 40798\Inexpensive.com + Convenience + Layers + Pale + Guarantees + Rap + Verification + Statement + David + Forest + Officially + Reasonable 40798\Inexpensive.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2584
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Personality + ..\Sleeping + ..\Morning + ..\Penn + ..\Threads + ..\Graphics + ..\Harrison f
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:3008
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\40798\Inexpensive.com
        Inexpensive.com f
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1560
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\40798\Inexpensive.com

    Filesize

    2KB

    MD5

    55e4bd0f562c6f1e2f4905feff1b0cd0

    SHA1

    5f078fb22b89de74dab0fdfeb7e1102b21d293a2

    SHA256

    eb8e325b310e2c24fce058511b8309e9aa4c83a445ac630f50cb1d697f0fe353

    SHA512

    4c16dc4f75b0d90c29a2d356f3a6339918b64aa0ae7231fc1be1a2c52dab5140ea0e1e684d9c4041d10bd84ad72da0ad22968424b0a67fd37399e045e8821154

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\40798\Inexpensive.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\40798\f

    Filesize

    499KB

    MD5

    25992b0fa01f9ee7a8400e7ba5774086

    SHA1

    c491cbb1d302b6178212cba6bda9a02445dc9ac0

    SHA256

    89d43d73b4e9975be7d9085ce4cd3df3066f1ce394458f28df5604f40c20b9ae

    SHA512

    5c41ac23a04a1aea205e06657b9f448fd92e127845d84c30af1156bfa761e57baf03ec18ebb3e14e009aa1348f714179c5150de850e1b32dc23601a4a9bc7008

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Convenience

    Filesize

    67KB

    MD5

    98db9c0d8ce6a841ff8ee6db81d53640

    SHA1

    8386deb84a395f6325121974273134ab749fa897

    SHA256

    4aa6f67498bee03ee7c6429b7957cc8e28d03d2ae34f853210f663b0c93803b3

    SHA512

    0a3e821b12e9e7c53a57a25024ec9e86ba7cbb1e3267f5c88275a63e761bbe17e82d7dcc052135c0177cc5d2ac270f9bca8f46f0af85079025b8fb78d5277771

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\David

    Filesize

    114KB

    MD5

    ce87d7e3d282b8fc48b7c4edd0a45c64

    SHA1

    8dc20271e96df07b482e2bdba0005ca6f63bf2cd

    SHA256

    609fe04526521dc6b43671f2f054224e0809c948ffaeb3ff806c1ab5d9b934d2

    SHA512

    9f9ad6b0b108ae858edf2b3c38ee73d072997cca0f1a717644f9dc5ab70585f47169c4d56de81b9c20253e4000c629c46fb3c33ca96cd8e0d955a54e7ce13d64

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Forest

    Filesize

    102KB

    MD5

    9a3d819592ca62e82b697c3ebc6d839d

    SHA1

    ea7650b90512dcab3857b962f85b877d5a3d7bc6

    SHA256

    6bd506626f01e413fbcab6a22e903555fb651bd681381c42e74442a2daec6355

    SHA512

    3a094c8c6b9c23934e8766649a51a38d635f7da7d1579c4ed554ceac3c571f1063d830b791e0b92e5c16406780d51aedbbfe5255a9f3dc468542d6878c300fcc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Graphics

    Filesize

    73KB

    MD5

    42e27169ccd07959e4e7e03bbbc0ceed

    SHA1

    5a6cf9d9e8392ab8ba291dd79370c7573246c0c1

    SHA256

    66400f2df9a3f70e09c296b6055269b1a5fbc380ad80869fad7a26f965dd1227

    SHA512

    c47d0a041a7461d77159749a65872a15cbaa20b87bd30b88ed5795aa3ea22c0ab75b4ac4851bdb3bb18b0954b989322c8dbaab6a5f554a0ba31dd69612b8691a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Guarantees

    Filesize

    96KB

    MD5

    17508867d6c83603770c181e2d2eb1e7

    SHA1

    5c7fe4ded3d3cb893897af92f506d380137989fd

    SHA256

    84f2782e4dcca2bafb97e6e128d64941fd4a78828c8a1ec220a2e42d470127bb

    SHA512

    abf710cca37219b28425a98990c74cb6975a7d1e505a97b88ad28b1c30a15caad36263bdab5d2973533861ef5c4651b385599400107f32820ac0c259beccec7b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Harrison

    Filesize

    28KB

    MD5

    9fdceb91cdb6f2f80cedac6126c97b30

    SHA1

    e4417155926d5502ade0062be0083f7b8136cb9e

    SHA256

    7401d29c0e1e8ada03e51c5615db08e3eb86a37c80c1d11cd43925b2dcee8b9c

    SHA512

    81b1e42b0e7fbe2d6fe989a0e20f4a9fe9fd1f23620435ecbde09243f3c46fbaa00a2c9caf6c9c5154e55b1d8feeab9b6975fe429175c45389ba37e2aeba3a1e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Layers

    Filesize

    63KB

    MD5

    558f0cb7e036d1b8a452689e0e2e7073

    SHA1

    9fcecfd5e68211f0243efa98163c702cc4791883

    SHA256

    c25086710cfef07c1f1bac02f60d4f634066b3391ca84a7673a70b1b44f42749

    SHA512

    72ec4371c9b4f507227bcd2d1aab8984a4682a2d50ad6fe94d00b3f6fe8228491abf3bf17b81c9298a3ae737344b770f2bdeeb524258de3b561433c2def8334a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Morning

    Filesize

    84KB

    MD5

    0fb688aadd69ca6b26fb9cd776539098

    SHA1

    7f98c2355b5e38bb6ab5fa4286b4718fc303f666

    SHA256

    38f15bfdfba5b00b4d453b7cb025a87534aa2c8bd08544d1a34e6a3d4677f490

    SHA512

    80ef9a4ba9289271b8c3191f3995a21e3820b7764df227ce886e33b86e608b632bd0c24e7571f59b0b8efe663fae59120ef49f2eb36aa361110d9393234930a3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Officially

    Filesize

    96KB

    MD5

    64d5bf5409f125d915bb10cfbc73b9ab

    SHA1

    64aae274928edbf29aa736bfad02a76e05478ba4

    SHA256

    db818385c468f7c156a0ab56dc80736239375a17350b449ac46ce6cba0b34ed3

    SHA512

    4cb65c1c361d91e550102a29bc8854b3e1d6acf0b8a4ef7548a16ac17ce4c096a26795c47bb7d077795b0b1918f107574ebe275ae5d2240b3f60bb2498307a0a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Pale

    Filesize

    78KB

    MD5

    71a45ee28a4f9ad2385b983f0b4f4834

    SHA1

    7b4f3a4d5a1b6d9f41eec42c3d2c998c704e81f1

    SHA256

    205525bc5877072c775effd6dc8ddeba5aec0c8f766804eeeed21365fd197211

    SHA512

    723c9ca7a565dc772a9da0d424cb67fc426a45e08625856d6c9120f9700e1d33f9e0798f025423830e1f8d9a9ab3181ffcf51ff4746838a7d151f1b202782742

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Penn

    Filesize

    82KB

    MD5

    ae012012211695fcd98109d56eb071ea

    SHA1

    51acfd62cf132efd6c16d62567324b4de13be813

    SHA256

    f9fc34a7321e5c5a81ce1f107bf5d9333d7cde73cf73aff7126c3b3b30bb9a6c

    SHA512

    6d16e5a7b03900424b3f4c123cb8beb873910f6c4fb5f165b9fe897d6e87e2dcbcf0819556b88039b90bfc570094943eb87166ff05aed1b43ecfebcf7761afe7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Personality

    Filesize

    79KB

    MD5

    dd683285605e204e3d3bdad8e98471a1

    SHA1

    e226c6bf973aefae91b676153a66b4e892a53917

    SHA256

    d0253763f7042db5cd3f4302920113a527f5735bb8d4a6d92af2215afd1c3542

    SHA512

    49d47aad5ec1934b86efc1ece911a298c2b2952b0633f42a7b8f153f12209c16d5f1cd65ed9ccb2ce236b844020d821c9253142067258ae370ea8e566a53541b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Rap

    Filesize

    57KB

    MD5

    75f2e6d81339383121abaa38818c6923

    SHA1

    9099de8de46e74ae546ca361afc396d40f656700

    SHA256

    2e864abe8e05a792f68091278f411fc8080849a0657d63a4fd4b1fabe043b297

    SHA512

    a7e65f739fbf198df06b5fe5d6ef14dc36bee22845423ffa2995aa522c6e89cf97f56143f6c6e1a5fe5ff56e4c65c8a647ed7ec9d02fc246db3f845e19f51fb4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Reasonable

    Filesize

    105KB

    MD5

    fa0b02a8aa85ffcc152f835e65d6e114

    SHA1

    e9dca44a74ed3f352670635327555dc4c1c04e03

    SHA256

    ad9a9618382290f28b24eb76de01d9d3be4f1d8a782cf44114640f18d3f42a2b

    SHA512

    3a8f088e6f7be3fd42c661375aac2ac7a6d54a57f1c0142b33dfc92d29f3bb667abfcfbe9df793685f07cb4baa09483785897995115873ce5e7a8228ce7443b7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Referred

    Filesize

    477KB

    MD5

    247ea765483211b63749fc72acdd038b

    SHA1

    23cc9d208751f7c3f6b7071e360972176bffc47b

    SHA256

    ac501519b5412aed5387103fdd031bfe8d0f5b3d8aeada6e9fcc369136b1a3c5

    SHA512

    73565fd47db1adc668773209843fd4aa48ec4c6b5b807b537b40061d3990015f6dba19e4f49cd095a1936b57c9433d7da7a2ac313926d41edd28012009f431f5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Six

    Filesize

    16KB

    MD5

    6ea35882934000b0fa201730629e319d

    SHA1

    c44656da94c255b8a17be5b1e3f3d54ae88cf012

    SHA256

    aee7e52c626a32de21e70a3389c4b92352fd14ae5fd1c2a6ee4268c390483784

    SHA512

    ae64d7a04628aebc5eefa723a42a41a32c1426f4e134a50016063c0d5ea1a42f519faac0858ad5e17bd01c6ec215089e74ff7a2039ddb84aee608f8486a0a960

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sleeping

    Filesize

    87KB

    MD5

    218a7ae99a9443dcdedafcf5339e01ff

    SHA1

    d131cd56b6107943b5b2aec9deb80b73854b0286

    SHA256

    8ea903cf2128a826c4e737a325eac95e42ce0c9e7cc4b7a9bef4e393dd0721be

    SHA512

    4765ea6e54708547c0f4cf9b353fc4a1d68d44ef7c909c66ce3d307ff9ad174e80a9f7987655ad77c8d1c1ffaf5182f312a17af499ab4cdb589a8a7be721441b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Statement

    Filesize

    68KB

    MD5

    6fa89a45d5ddeb9dc068f8f6f4b89869

    SHA1

    d6519d0e799e758e52e1330141c66a2e70454bb0

    SHA256

    41eff479c1ecc7b5054a5dcf3f75d531e42cb5261e5c6896fa6aa7fa9900a0d8

    SHA512

    6297fff22c6604ec83f90058abaf38c7661b2fb79cb11c1870e2b21074e53522cc98f3f42f3d6995cff365c222c6cf597fbd98cc4ee13456913a904e6bfe74ac

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Threads

    Filesize

    66KB

    MD5

    1f76cf409300b07b3598b6ecf3372379

    SHA1

    e7bf2a9fdd140486f5ff7699c2d56ad3f5e13b5e

    SHA256

    8964c99a2d8df3c56cea5783b0ad3dbbf5799f1957ab5f9395f5efc0654da3bb

    SHA512

    b08b00cc2c9582647f3b390088c86d6ad9d8ca683fdf576c3b598a1b4f0adfc95c1c93c2217cbdb57420df002c65958808bf10ffc6a244cd5dcea46c952769bd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Trip

    Filesize

    2KB

    MD5

    41958c5e501a5ec608d3de0a7f474808

    SHA1

    03ed2d2d98a01e1d3db490c733fc0c7578aee9df

    SHA256

    e97c68a6d6d7d6a750d113affa394c05fcd7ba4abce2282f08d1151d0fc24396

    SHA512

    5a06a58bba1a278874a37c59916a31d8bd48a4243363a371295b72fd270c9d7bd5c6d093aff8bdaff08f886e652609c3d9340cf58d0226c3a73bde5405850a52

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Verification

    Filesize

    76KB

    MD5

    aa8adbdf71a017577bb4ba27da22cc35

    SHA1

    c6a55c713c748b29f60340a4e8fc6d592e07f2c5

    SHA256

    aaf1471c381bb8d8ca4552eea77e9c22d41008ad587aaf61c5f0287d9b137441

    SHA512

    bf3ce6e99386dce918258331cb242aee05f043682294ef9fb6696f381a1c4bfc9476ad7ad5d11371ea836b76ddb7b657612e58c9a876b0471074289002d59631

  • C:\Users\Admin\AppData\Local\Temp\Cab5266.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5279.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1560-78-0x0000000003B60000-0x0000000003BB7000-memory.dmp

    Filesize

    348KB

  • memory/1560-79-0x0000000003B60000-0x0000000003BB7000-memory.dmp

    Filesize

    348KB

  • memory/1560-77-0x0000000003B60000-0x0000000003BB7000-memory.dmp

    Filesize

    348KB

  • memory/1560-76-0x0000000003B60000-0x0000000003BB7000-memory.dmp

    Filesize

    348KB

  • memory/1560-75-0x0000000003B60000-0x0000000003BB7000-memory.dmp

    Filesize

    348KB