Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 01:59

General

  • Target

    BoostrappersR[3.0.9].zip

  • Size

    54.9MB

  • MD5

    6a71b8a2581e4117d15bddca368e6ec9

  • SHA1

    43141c83c1d12ec7213d0274a7b8972ce16a17c7

  • SHA256

    2bbcd2220b0a71c8a7954f7021fd3a9f45a285f4da2ba19d827d4ef9935f60c1

  • SHA512

    5c49c34be5f63fee93b0b0ef1ee775e68b6b32c9b8a74c4420d290eb6bc374459e3ef844c846c0884dc14f4c45b44028762c4f8bebeecd5b3ee522ce58762c66

  • SSDEEP

    1572864:mfatNy95lOmui8ViWgWbv1QiyEWepWhfjZHcgRO:T/g+mn8ViW/m3B+gRO

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\BoostrappersR[3.0.9].zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\7zOC5B467F6\Boostrapper-Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOC5B467F6\Boostrapper-Setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c move Recognised Recognised.cmd & Recognised.cmd
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2232
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2268
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2160
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2676
        • C:\Windows\SysWOW64\findstr.exe
          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2736
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 484968
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2604
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Ratio
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2728
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "Forgot" Maui
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2488
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 484968\Trackback.com + Face + Terrorists + Thehun + Closure + Roller + Reception + Nested + Wichita + Casino + Clicking 484968\Trackback.com
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2520
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Powerseller + ..\Pn + ..\Accreditation + ..\After + ..\Continent + ..\Risk m
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2336
        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\484968\Trackback.com
          Trackback.com m
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:664
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1676
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1332

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\484968\Trackback.com

      Filesize

      284KB

      MD5

      c0f3838eba98b2e512af9c3dd1e820b2

      SHA1

      4025e3a81f34b0b82fd54ccfb21388ef4ca0a39a

      SHA256

      8ddadada3513dc70746b8db3266cb1700ddf093e099e52c5e2ec74b169b09b34

      SHA512

      f57b03703351704493fc9c8b1bd4dcc67287d7670b445a3bea744e6e265984b555221f1f06d1c51ac05c7b9dc0ad80d9a2ac7c9ef99d7a9e4a5e8f808c237174

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\484968\m

      Filesize

      456KB

      MD5

      1208de638bf5ec8549a3a09ba88f2404

      SHA1

      16cb4eee76e7527e21b5c4467c6e1907de96a6d4

      SHA256

      d077914235e2ffb0516f463c8d04363f8e18cdb9a1c4b100eff0eac04b509763

      SHA512

      b1c635700643b79348c07023159baf231ad537b48af7014200d8fc802fd17673b39ef167364097f94297aeb404541b9a288d429db546edb426821f60d217512a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Accreditation

      Filesize

      78KB

      MD5

      5c812305ef850825e0431d590c9f014a

      SHA1

      723edb8aa608ba648f3873fe703fad617afb8763

      SHA256

      2c0eb2ed785a99f0efe56396331ddd8ff86c1c7d6aa5b4bc65b5b028272e81ce

      SHA512

      6bdc92450d9793250e75e2a93544a98db3fe0b1ee73b58a51ab897fd9a2d5dbc10a2a88a758b7ae8049b6648edc23ceb5c0005deaaf406c6d438f9349b1f4541

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\After

      Filesize

      88KB

      MD5

      5bf24e597eb2cf2f9d542f5151142951

      SHA1

      239522e709f4d3e6e4f8452b783b3714b58587b9

      SHA256

      03bc9e33000bef75e35a1c0cc3e05a86062b63da7eda2586b0eb711030e9a5c0

      SHA512

      17b609d9ffada36820ccc40b6bbc0539ed0a7373d0028654d9fe09f36a62e278d0ef239a94d13c6eace2824f6e5a17aed9adf7617574b87ac5ab842fa11d1300

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Casino

      Filesize

      119KB

      MD5

      227bf9bbec8408a10b1a4a289ba77401

      SHA1

      86cf90b141a11ee7d27bea1807dc959aaae5f583

      SHA256

      a5277b8fa9b6f77ca6431d5c32f15f317c52f1efb7f88dd8521a585d902586b4

      SHA512

      a5c79ec530f449479cb138061f8b79a5d9d79d9d7bb854461059891c230a43a9c1843201cde47bf90e87fcb500ff31d98bfcedcc57079158848494f18a812c7a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Clicking

      Filesize

      58KB

      MD5

      76f557310c653be04b4f805e0c6397c1

      SHA1

      7e7fe5eef7b32f4455b6968c5e970eaf88da15d2

      SHA256

      c87c041619d47aed9b511042f2b4d6fba3862dfe6206818fa4570ad5a663aec1

      SHA512

      d9eb65aecf654d317566615c9176ab814c05ec5394aef942f8f13506833bb94ed669cfd8988f3821afd73b2b415d3ebe421f761bd50f98d5d4a7542b7b0d81f8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Closure

      Filesize

      58KB

      MD5

      2077269e8ec2aaa990d23f0647dd4eed

      SHA1

      e2795853dba57687b71bf235165fb16eabd4723f

      SHA256

      3c5323eda19b2fafdd64a38ec9d9018cc8deb089fe9536398678777fbae8c8e4

      SHA512

      ad85ca9163a6a06e3a5199efc51890524f6ba1ee9054f1315b3629467784d10b66489332997b8688372363c0d57ac44c71a86e5aa0c5b651ad568badb49de49a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Continent

      Filesize

      66KB

      MD5

      5f746768bb2de3ced707b70288ac4733

      SHA1

      635afd41fbcd920a0f9437d0fa0b7ed3ba02ce8b

      SHA256

      2dd65c4135b9ff60a415cc6af53816177bf16a0a6f1866c738d5a9efa8a98f99

      SHA512

      c78c287126269ceb8f9bcd20e2b2f4c7e7a4b7964aa20b08c2b1e45ceb329f6e2dcf6ccbe92b5153745510d5ec1dcabbaf3d194ff96eadfb9d0ff81e312e3b18

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Face

      Filesize

      53KB

      MD5

      6f640def208d9e8360bda93298464fcf

      SHA1

      00b920245f01e6fb4c9cc11af17f074373fca79b

      SHA256

      f3393f291a3859b1eee2c7c3633bda2117feddd81540e0df92bf50cb04468c66

      SHA512

      aa712dfeb76e5b1c745059df65f46cdceda9a6c6ca1a2519c539d64bdc762bccda59f1cd58b5499e773d89520443b9364ba56b09f7a1d955b0b1e6e539aeddb6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Maui

      Filesize

      860B

      MD5

      20514b7861da2bda60ab3e5457c55a25

      SHA1

      d088ba8f1d59357d491bd3c845314240a0dd1e4f

      SHA256

      a16dcc3dbeafbcadb2f63140ab693cdf23ce6e952a723e87af3de5d95e69cc87

      SHA512

      bc2fd3209fbf3af101614f7df8b9199efa16f10d498ae5226a148db2d7dac2ff04dd8c8880c35be020f1e4ce8e57098682502162b656a7ec55b8c17e81baccca

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nested

      Filesize

      91KB

      MD5

      9d13f05b9a71d8dde2e77812714f89be

      SHA1

      cbf85b87fe308c764d7c8c0a4b0055e0b29d1e7c

      SHA256

      c2683a6e3197d6524b212d53a5df1244a06e40056f7b79ec0733496f96f8fc18

      SHA512

      2884e6653e971366993453318fe102231ff3180d77d00d05374d7a45c2863e4fa9fadad3949f59de9c8282ea086cd201e10f96a13c8a9941a7659726f6b75d81

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Pn

      Filesize

      99KB

      MD5

      1f5464a2486392bafdc858cf0cd5a4d2

      SHA1

      817153c40b0cab258565a6e4e9704ec8a1a4e33f

      SHA256

      5a79d5e3b8cf1466872be8ae6097d7bc68c23ee0aeff1b05cfa6340e2f0ff9df

      SHA512

      c68c196ea077e56a83a994ed1c8d7b80307f73c908cd1da4af0bca8eaf051f5cce0e77d7c6b3a7ae6b2589f692c28019b6aac88bf2f68914c265a1bd02642322

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Powerseller

      Filesize

      63KB

      MD5

      085b6cac39e894bd415175322c5c70a7

      SHA1

      258db05f3be1d0bcdeaacefeb392f5a29ed99353

      SHA256

      cf04190c6b7609df58042c6b603eec15ff543a1c815a66bb0f09b7ec95e6effb

      SHA512

      400331e5ccb51bdea7b1e7af1c84af741f07464ab90094869ae51fea88db9461a80769fe6ddb789a0be423da9dc903e9bc979509c72e5490846dfaf265f7db21

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ratio

      Filesize

      477KB

      MD5

      d3c0d6cd4f80f6509ab2f8963488f3d0

      SHA1

      ee272122bc647d5bbd6e21cdb97245d5a1dd0763

      SHA256

      d5a172c7ae8f88117495c09d1bf3a469981ac5a540d082f9e39b0f39a1d5ca3a

      SHA512

      fb0afe20dc9b0b027cab3997b23772379c506afd5f7934e6108c59143611b187323808fb27d3f5d05377c6c3e49895440732841dcae39d2117eeaaef6b820e30

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Reception

      Filesize

      118KB

      MD5

      21038b2994a294b39e33cc501c1a05ee

      SHA1

      50c1d712ed63fdbf187f1d9ac9addac3503a976f

      SHA256

      20ce780c417f346622d0476e9aae17c62324397a5fda7c5f8dbc8ed9c71fcc9b

      SHA512

      2ef16b3945541d0fa39fc1d3da4f6f3748207c4c68206c70838215d314f84e513d55cf890b410dc30d60fab25c8605dcb898c822c9711035afca028fdf4a5bef

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Recognised

      Filesize

      21KB

      MD5

      e1b69dc2271076449b7fe047ac482984

      SHA1

      bcab3c731619749fffca84fca4d88756f3452cb1

      SHA256

      d281f964e56db7bb27148db0fbff842b4e53f123beade2d0e036f82d3a3a854d

      SHA512

      373c6af2e0a8dd1bebf34c4f897f9613a7d2843b07555b4c29420f3ac839384cd04b581529fc8e0cd16807442ba1c5e601e2f79cb132f8c284b09b9c4a9c7bab

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Risk

      Filesize

      62KB

      MD5

      cd7527fa445dbec2e8b3bad47de16929

      SHA1

      3970dc1a068fa614ffa6dfff201132af7dc84751

      SHA256

      1344291908f61c5461fe78f93f4748360052ddcd3391692f2148fc570ea4a06f

      SHA512

      8692c6345b3bcefffa519a16b0e7f1615e22e102cd1f3ab913c394cbc56ad55b269bf918953992596f1026533fa458452d0d8759c3f2394ed029e379c5c710a5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Roller

      Filesize

      141KB

      MD5

      fa81f3538e7caf8ad17d26969d8d87ad

      SHA1

      5b06ff33e4aea6c59dcb6ea034ac085aea25774f

      SHA256

      fbc991e234bf9c4b48514cdcd02c2646e65203d4fde35c22490806e869dace4f

      SHA512

      2ca23e42a13676ad4e87f12b8c8d195d729c86f327c5a5fff317fe78f9cb9b7ef5c8c1982f53e1111fb8b46230569fc4bb287ac94dc0437c99ae669b4932fd1e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Terrorists

      Filesize

      64KB

      MD5

      1798c08ab7269e5dc50d97fa0fe4c1ce

      SHA1

      bdddb294c0d6792ebf3f3b9e4f4db2c2b95b6208

      SHA256

      5d4c0d897ed74e744542a76b03d67c292e6c28da120655472a2639abeda68207

      SHA512

      02883fd39426160aecb8f0507e9ba8a8015f70476217cce3a536270a574255f621616b0c2995d45cd41b726295b01ac22e777146462469f8cde78b84d35264ce

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Thehun

      Filesize

      109KB

      MD5

      7ce7c4ea5d8e0b48d5400093db7d6310

      SHA1

      b9d27c9f6349a24e9a163ff8e52f5b937be21758

      SHA256

      bc9279f5bdefd7b37e686f3347ee467661b9f68ca2d220630620416869780ac4

      SHA512

      0484767d0c8cb58221fda088f4202278b169da812c41e25bed66b3dd3ab4427d3cf968db3e7f20b6895eb3d1e1ff7a8a1dd490added2b9cac0600d30bea6ab07

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Wichita

      Filesize

      113KB

      MD5

      d77a611d6b2a51a697a734dc7b0fc795

      SHA1

      106d523c59f63d6ced9391ad9d48891b75f63643

      SHA256

      e79eccddd759fc7247b2dd2ec942e1ed52ed1ab9eadf897c172c7eae25bc5d8d

      SHA512

      4fe6dfb75d51eb0508019350465c88fe6f9d870a3817dc0614857ca45effe1efedf33a680bb9fb2e3675744bc3db14981052d630f1f551108a81dbf406d7d081

    • C:\Users\Admin\AppData\Local\Temp\7zOC5B467F6\Boostrapper-Setup.exe

      Filesize

      1.1MB

      MD5

      1c8f61ebae1e301d9b521e2e4661ea71

      SHA1

      e4419155b9e29c822bb82430222a466f8d18c979

      SHA256

      04cb3fda38692e884e8782a79b4b431cc2f50a3a0a7bd4c368f35df4b536e6ac

      SHA512

      c09777c8d426b3320c2cbe828b20dfe516773d28a8f24f8c1e58ad1bbcf838cbf3eaa6b0960a0ea2b939d1beb38c9a321681afe24cd49878c9cca9563c75bb50

    • C:\Users\Admin\AppData\Local\Temp\Cab230D.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar232F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\484968\Trackback.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • memory/664-80-0x0000000003580000-0x00000000035D7000-memory.dmp

      Filesize

      348KB

    • memory/664-82-0x0000000003580000-0x00000000035D7000-memory.dmp

      Filesize

      348KB

    • memory/664-81-0x0000000003580000-0x00000000035D7000-memory.dmp

      Filesize

      348KB

    • memory/664-84-0x0000000003580000-0x00000000035D7000-memory.dmp

      Filesize

      348KB

    • memory/664-83-0x0000000003580000-0x00000000035D7000-memory.dmp

      Filesize

      348KB