Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 02:45

General

  • Target

    bda506a1ae73f5514cbf100a95f54aeb2877368702fad312fabf0f2641b34f91.exe

  • Size

    70.0MB

  • MD5

    ede2e7d64a73a46b252525a4136b47bf

  • SHA1

    5025d1d817d6d9f24f1d5197759fafe7cde6f0da

  • SHA256

    bda506a1ae73f5514cbf100a95f54aeb2877368702fad312fabf0f2641b34f91

  • SHA512

    86b65b2da27a30233b49e940f2b609cff3805bcf00aa75222e07f783e1e8fb4bcc5b5e4c6fc4e6e264419ccefd92f093acc0e850ace8a9ee34ff81ae59458460

  • SSDEEP

    24576:lhYvug7sUOQNncXfPm+9zxBRj0oLvcXwH4OPFvpGIr7CJd:fLg7s0Kzx/j7zcXwJPFx17q

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://yokesandusj.sbs/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bda506a1ae73f5514cbf100a95f54aeb2877368702fad312fabf0f2641b34f91.exe
    "C:\Users\Admin\AppData\Local\Temp\bda506a1ae73f5514cbf100a95f54aeb2877368702fad312fabf0f2641b34f91.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Archive Archive.cmd & Archive.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2552
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2228
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2756
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2764
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 811185
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2864
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Thousand
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2848
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "makes" Makes
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2892
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 811185\M.com + Symbol + Bang + Sons + Prefix + Re + Answers + Frank + Chancellor + Enable 811185\M.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1996
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Gather + ..\Intend + ..\Couple + ..\Und + ..\Desktop + ..\Laboratories + ..\Leonard c
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1744
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\811185\M.com
        M.com c
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2192
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\811185\M.com

    Filesize

    1KB

    MD5

    ab24984f65e3521010f6ddb0930ce019

    SHA1

    e80746a4e169e68a6916f261d7ae41ee5262ddbb

    SHA256

    dd4af202f0d79e91c3c49c6f9fd340f0016c6df65c207d884c6ded0d3feab9fb

    SHA512

    021d7f814fdb5db28880c29714fb9ff94bd858c797e9c178e374b2316e4b1f6e78f366fbfb4ba95237917e1b154d7dbd471812f3d15d8798c0df59ae39673188

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\811185\M.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\811185\c

    Filesize

    511KB

    MD5

    c968adcbb493dc9d2a82f36eaa9e95f8

    SHA1

    282c85e77b6237addcf74a0b939fd16efe84f502

    SHA256

    892a47eda407113d570628be1967a42b3dad57e69d6bfd0df44a36ef630d74f3

    SHA512

    028ba278b02c7cdd83314c46e05044f9e6f756b14749da6380a69a3154f2d6689ea9433d83c5122cf79de764be211119abfd7c385439a9feec4f4047628a3c3e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Answers

    Filesize

    50KB

    MD5

    c0ef729745f6117c348bedb0eb004abe

    SHA1

    2031216f14e729ce341e8ad0d21c1d33a5c17e2a

    SHA256

    7c9cc1aff714e9fc46a16590bfd851de16430c97aee84c3753c6e8cd04cdd515

    SHA512

    ba4b20471c72de6c22af3aacd7418ed506b13160ed32ed28b4e91a2199ad1137b3df06d9221a3217490ff84d00aeec03b70a488f5acf22dd3d2fcb268606119e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Archive

    Filesize

    9KB

    MD5

    a3b49aff8c628f5084d67eeb9472cedf

    SHA1

    5a5bb00725756f1d2d752fae042ea1a485da9bc9

    SHA256

    d54359ba0f67574cb278765c01c8736ce30f7ba0c334efd0257de870a05400f1

    SHA512

    e8e40d4de1bd280e207f2a9ab9e081d5b93316e8bfc2a10d0bff80eb255c1f5785bcd6fbe3a15e5adb56f2c6806c199670b342055e3d539b0e06f5f2cb17abf5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Bang

    Filesize

    132KB

    MD5

    63eec4b702cba3b241a629ca9b0966c7

    SHA1

    5fdcaf7666ade1a5b65ba4204771a20045949c3c

    SHA256

    e640dd754559bded9648b416da345766922be9ad3442638ad4238f461e3742a8

    SHA512

    6c172dcadb4f32428df8b8c2c644946d69f4c4495b7d59a1f89c48b11830c39df1da4996d764899633a067d69a723429a2eda3aea02fb1e531002f517426de6c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Chancellor

    Filesize

    112KB

    MD5

    deb2ef5841c03c8199e3b62880855561

    SHA1

    2896e5e53c174eef57068bd1c5d4ebe593d2fd26

    SHA256

    4127b751377338e959ef9c806dacb750d3ade4044312bd5d18fc88fcfcf71c49

    SHA512

    d8b6b96b28003e9b3c264d816761ee2a21e901ee9680d24a09b106985ed35e642125ff240e3eb6474226fb6e9394a522069b650c300ecf21d17f64b460bb17f9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Couple

    Filesize

    80KB

    MD5

    8146518f972046e4a3ab8b7afed34f41

    SHA1

    e38256138d51dcc8651562ec46c099739965c94a

    SHA256

    d0ab7dd5d449479e2a8b94fb02c793774a719ea76d8abbe0e727320ebf1827df

    SHA512

    076de92ec7307c1e587fed4e3053f4b61aef21ccfeabba17c0fa61f026f3fae072dd3ce57a2e419bdc77836ed666afc372228b30296ec14529cfb57271cecf64

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Desktop

    Filesize

    50KB

    MD5

    cf5c8a28e5cb0e61ed033c3ea6efaa7e

    SHA1

    95a5ce7b3ca88e5c8a2483af9585b467aac325dc

    SHA256

    e7dab9a1ef6fef6eaf979908f89f879d1951f7941bac2c5defa85b71bc28ba42

    SHA512

    4cab47f1cce607018f3d4f97232c3442f7eb4786813ed008020237d6189101953363efb1f29a9a36c0304da834118a828e3ba623db01da94588268a2e1d0d8d6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Enable

    Filesize

    46KB

    MD5

    e10c4f74c953cf485827811ad726d7f7

    SHA1

    229733b8f94265dab942d47a476fec3dc5a0b4d6

    SHA256

    e1242e544f51f0b3c5fba0e4364325d07f9dafd69a8ca2bdff95bc9fa441938d

    SHA512

    d3ec1e2b52cd58ed890d84005adff287fd0ff8fad96981800fe4e0aec4b9dbeb42e20ba2d550c34c3ccc6682f57188da8537f03a36d453d73fbdb5c0563b3f23

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Frank

    Filesize

    118KB

    MD5

    a99199aec5bc87a1ee2f8c545403fc99

    SHA1

    96f6af78fc4a1b3e7584d08ce6b37a509436bf4a

    SHA256

    cb14578b039ed3e7474af41d30ad0802e0cb2d14083e455742783b3ac0d40c1d

    SHA512

    33858f6c9fe204ae42d4fc5062b80520234429c9b77481f7ed113e0065161d38bb89b68b3b03d7da488465a24194bfb3c57ae2653f4f6b41dc7fcd46d06b6d72

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Gather

    Filesize

    70KB

    MD5

    19a1cb04b353c4311062eba6b3698dca

    SHA1

    fa193375e64a1f0943c0c6101b4855cba6aebb06

    SHA256

    794d207c1ef7e7496c18f1537cdd905c8770ba74dd37899e0e5d57e5bc263a02

    SHA512

    8e2b94340b194cb80a85db4289e008a45a42887627d9d729b87d3a3d14d286d41941efebcdc9cdb510bd757bd2988f51fcc302eb9786e87aed7c7e275a23a275

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Intend

    Filesize

    74KB

    MD5

    22cd791ace0898dd41c34f268ce1bd58

    SHA1

    8172a0bd78195b0771fcf47591f5c69a1d684038

    SHA256

    e581d98106e4489d2eee549ada60b286c8eb16734ea6afc85460ce7ed5ef8fa6

    SHA512

    9542e2e8023cd5e6146e40215f016029a7e0996860d269284f615bd02cc491fe40fece9d06b4f0b43b958e6104af03becbbf1ab4e17ae349d89ea7da7129cb89

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Laboratories

    Filesize

    96KB

    MD5

    ae3d975d673229d2da6cec3af9ee9732

    SHA1

    797e8261fa697d3fc874d26da185f257b3b81d5e

    SHA256

    68cef50d6b6fa0ab188bc868f09322a76815473b3cab69870df192c82c88a39a

    SHA512

    08790808e0825efbad01c8c2943fa76c740d869de6b7c565964c732154311d0a17e1e6f16fa12f7c2bd68323d2d9d78a3756c1e0fa6078f4296eabd5d0835af5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Leonard

    Filesize

    44KB

    MD5

    443721ab42dc4d5d15c8787f5a514e32

    SHA1

    97170dca5c3f4424ca91713659934c2b172e440a

    SHA256

    b8a42699c79c3217332debdbfa10c68756b768ad0bad985cbe8b11c108d4ec58

    SHA512

    87b31354964e9e6178d75d0c1b25c99ce422dea783172fb971d4d69482d14db6ffdfba01e2c014228b9509ccf9d82b0e8a5b85fa542c2a800ef1a2af864b63b3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Makes

    Filesize

    1KB

    MD5

    bb88411a60ddc0157e8d40d1ed76cd79

    SHA1

    117982a5d6d309fb2854ce6c0640d29b75033538

    SHA256

    2a2d98124d316800fe418ba09b228259080ee85d66beaa46dee67fedf597620d

    SHA512

    0a83aae0cd0e5a793292b39a95e9232a2acff82e59a5dc294cbc4c5822bc302f61c463a7083a0b47ede6df74b3f1c9b021b1bfc3f514b08e36a20a67a6f6426e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Prefix

    Filesize

    139KB

    MD5

    5042a594da710e47600836fbc43d6ad4

    SHA1

    2da77ca2e0b3688213130cdf716d15d708571f0b

    SHA256

    169e9b982a79e12ccd7946b4baee1f4c87c820f404379be690f01320c3d536e2

    SHA512

    45d9e37d873aa17d6227f25a74908bd90716d5ac0c4ac636ee595c83750bf0631d1c154368bab8931a875031600c440f68185c06365de1212c7a612b3866fa57

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Re

    Filesize

    149KB

    MD5

    837bf147b892cced11d8599ce6da2354

    SHA1

    c69307105a9a7888c39e351df7b32ba1018f9c5f

    SHA256

    9d93b4f03094fe65b6505e8245baa7c9bba085f7d81cae74e6c98e4047cfd183

    SHA512

    8ac87391d1862a17179bad2dd75b169d30c2feb796e05dd34819368cf3d5eef42f4cb392aeaf910bc6580177d511b11376348ae5087ba473463cc36c2a81522c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sons

    Filesize

    57KB

    MD5

    8e17be931ce1809da31a0f6d0b6d2e0d

    SHA1

    facbf2933a2a37418fe111b1c52bd7e544814dd7

    SHA256

    fce2d1465a77ca597699578bf600bf962fc85dc09bdb68577bce432d9b20e5b3

    SHA512

    2cb8bcac36bde735bdf4d92dc813a749f1123a3dc44cfd3153c20f8c7e32f560fdd26d24761dbe15c0c2436a818cf1a42d427615206cd0be5397ec9322df2878

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Symbol

    Filesize

    120KB

    MD5

    3bfdfc2c0298a9f87e726d34816a69cb

    SHA1

    3aa28889544312273e065763d5c84a44bd57cc6f

    SHA256

    0a1ae6c240382136944f010a708ae95df886a135fa46a08a269228b5c0d942bd

    SHA512

    d72803247318bf39744baec8c5d1b4f6c6b2b8b5e7d94ea059a05457ffbfa18041ae6acd02681a1c35ffbfa9305f44e15f12688084f2a1acfda3c48fb5142073

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Thousand

    Filesize

    477KB

    MD5

    b46fb35146a48b73dfd677fe6de292a3

    SHA1

    0f5a70314a77df29c9838b9a523f76fd84c352c1

    SHA256

    088f9c381afd7b2f220f8d7435b46ed382602bb4c29bb5009c448c8cccf8b111

    SHA512

    5b7c41dfe0f925fd0b4cae040b4a01a11da083251f49cb55b2d475366c575c2a7917a37b9ce54353573dfe01a6e02157e7e5425f687ade5f4a4f56d1e09e3916

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Und

    Filesize

    97KB

    MD5

    4b02e727531966411d004ba983f04c56

    SHA1

    be7a75aba8c66ab7c3b20841e460a8d0dff42e06

    SHA256

    1d9a3b9e4277b27601bb2a0f75fe1232e5053e828af698c909142b78fed1b474

    SHA512

    978535d1a0a55160088ed8e5af815a4b96de35f361b880d4d06d353299d33eab625e3a38204bcf2fe59e964aa206ca8cf07bbafedf1d4d990efdd5d5649904f9

  • C:\Users\Admin\AppData\Local\Temp\Cab2F5C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2F8E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2192-68-0x0000000003940000-0x000000000399A000-memory.dmp

    Filesize

    360KB

  • memory/2192-67-0x0000000003940000-0x000000000399A000-memory.dmp

    Filesize

    360KB

  • memory/2192-69-0x0000000003940000-0x000000000399A000-memory.dmp

    Filesize

    360KB

  • memory/2192-71-0x0000000003940000-0x000000000399A000-memory.dmp

    Filesize

    360KB

  • memory/2192-70-0x0000000003940000-0x000000000399A000-memory.dmp

    Filesize

    360KB