Analysis

  • max time kernel
    93s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 01:52

General

  • Target

    d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe

  • Size

    482KB

  • MD5

    f23b6bce35ed7e7fd538a426defd13b8

  • SHA1

    242506b0ef3ece7276a10ecafa756c72c28b3366

  • SHA256

    d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb

  • SHA512

    3a45f9b785715df816686731968c295748f488896a93e9c1e2a7d26cf4b33e778735edc74821dd5d13ed6aa9b222f59c66cf72a2e79e6370cf44010e41396c1e

  • SSDEEP

    12288:Hmx08SHGoAYBTQB5zr1KcpiFCALt7PYNZPPs:QR+GoAYB25n1v2C

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe
    "C:\Users\Admin\AppData\Local\Temp\d181f3391f059ff37e887fd3e5055e83bc45d2f3ea744e37113564352948facb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gdi32.dll

    Filesize

    421KB

    MD5

    9a662a61f1ef199ccafd4363b4964b2d

    SHA1

    4fe678ec35b5efaa9481cb3dc69a66390dada7c2

    SHA256

    d4459904722d68bcae78b2c5dbca9621cf547a155245ece1ea6a23d5913eacb7

    SHA512

    085a4203b691bb62a3ea4049fe6c8ccc59e213eb4a3be8a04501a81b504f9c3a7b32eeef9ce28dde6317a1c3981c812f229cb3e15893b953769f3b251b48dc24

  • memory/3784-9-0x0000000075450000-0x00000000754B2000-memory.dmp

    Filesize

    392KB

  • memory/3784-17-0x0000000075450000-0x00000000754B2000-memory.dmp

    Filesize

    392KB

  • memory/3784-13-0x0000000075450000-0x00000000754B2000-memory.dmp

    Filesize

    392KB

  • memory/4996-0-0x000000007533E000-0x000000007533F000-memory.dmp

    Filesize

    4KB

  • memory/4996-1-0x0000000000A50000-0x0000000000ACE000-memory.dmp

    Filesize

    504KB

  • memory/4996-8-0x0000000075330000-0x0000000075AE0000-memory.dmp

    Filesize

    7.7MB

  • memory/4996-18-0x0000000075330000-0x0000000075AE0000-memory.dmp

    Filesize

    7.7MB

  • memory/4996-19-0x0000000075330000-0x0000000075AE0000-memory.dmp

    Filesize

    7.7MB