Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 02:34

General

  • Target

    66e6f6875a1bc0e6aef2be9b6f4577c8245ca3b4ead13a4e3f8d6e9248c03843.exe

  • Size

    70.0MB

  • MD5

    9284c1e1be5769dc80792308a978330a

  • SHA1

    4f4bc4ba852fc6e17e1621d69d16167add1ab138

  • SHA256

    66e6f6875a1bc0e6aef2be9b6f4577c8245ca3b4ead13a4e3f8d6e9248c03843

  • SHA512

    cbd834c2f8b92bf0fa51b0f7f0d76e1d609536c8a09cb0a39770b8af547d8979c8bc07eed23dff229363a3f1681997541eea743370fdbb8c50e9da6baebe79b6

  • SSDEEP

    24576:JQobnzB8GlDWZzHXrRls6j4+CM+lFkDHZ0vtQ34nS/DWHOk0L:beRHRaamvyJUDg

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://beattalkerz.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66e6f6875a1bc0e6aef2be9b6f4577c8245ca3b4ead13a4e3f8d6e9248c03843.exe
    "C:\Users\Admin\AppData\Local\Temp\66e6f6875a1bc0e6aef2be9b6f4577c8245ca3b4ead13a4e3f8d6e9248c03843.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Breasts Breasts.cmd & Breasts.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2564
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2884
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2820
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 221480
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2764
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Premium
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2740
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "SIGNIFICANT" Collective
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2608
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 221480\Fires.com + Sk + Sb + Entire + Descriptions + Thats + Educators + Believe + Childrens + Pioneer + Retrieved 221480\Fires.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2624
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Poster + ..\Debate + ..\Scheduling + ..\Fascinating + ..\Groove + ..\Stories + ..\Mailman F
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2200
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\221480\Fires.com
        Fires.com F
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:576
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\221480\F

    Filesize

    494KB

    MD5

    62459d3e0a66a0bbdd155359b3688a04

    SHA1

    6bb1f334a82e6536580d53cbb067ec9e0e273696

    SHA256

    a871851af14905cfe2f7d5e3cd922f39ca17ff499280971b91725969ab38d2f3

    SHA512

    f62dbd6a86100b75edf7045dc205aec208a57a3206e8da33bd9e5a4b3b782758ce97d251bc6512fb88c1b87210a711e023657a06c9434289b1aa4c3444c03e02

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\221480\Fires.com

    Filesize

    861B

    MD5

    3c08987367207d5908295bf2bf66e028

    SHA1

    b8d563dc2d503a2e6c2243cd375600da8530e2ef

    SHA256

    e5439fdd111d837b86baa9173fa66f5229849273b4c63363a45cf5d40b09c591

    SHA512

    d9b4992312a21bbdd6211cba8b1146e3346798bc46dedb4808c3f8ec75640438f020071e73bcf97f9832de52038f42a0739f101180a3ebc60b332bffadd706b6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Believe

    Filesize

    77KB

    MD5

    12bb55787ad2ec6d66b703ce2144f7b4

    SHA1

    c6c0d2eba7b96251e20bf8f16bda3222bfb4a39b

    SHA256

    0d4dcad8dee6e26a0b8db05e178484e015fc67db709467f391c131e253d478e4

    SHA512

    37d55925298736378263c50d4ecb6986574a60b51d56864e6481dad4a7216263c66a5907cbdc204145b6bb34cb3da3b7ca636ec4abbbe2bf2458c153091e8267

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Breasts

    Filesize

    23KB

    MD5

    97a351c5b2adf2e62b7a3da2f24a572f

    SHA1

    2ec1fdeb95a813cf6b89ebb6c5b6120cf1ec7af1

    SHA256

    814d89a6311d206afa43133e06635acd499faaee5cd810605637ff538de356ee

    SHA512

    f4dea36bf09c47cb0ffc5d93848378e13413fbb934a1b5b35ad46f3059cec7834fc8180a7f1f66c57d6c471e7eef9905677bda79ae1f547f0eb830e14e95782f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Childrens

    Filesize

    109KB

    MD5

    07996947a147f1af5313d5ce7424b148

    SHA1

    68545a3f651b16ecfac174bf8ed51fce458bdcf7

    SHA256

    8c4fc164f14874d4ade024d80b2e961ea44a1dd22984ee38a9d429815f530218

    SHA512

    fdfb154b05a8531066395803c6fd392aa09b1f877cfcb1ed73af078d728acf878f1cebda22fdc1f737c2752dbe21654e6a58261dae232727ab77784e0cc03f0a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Collective

    Filesize

    872B

    MD5

    b405fdb499270db2b6ebef63160cec21

    SHA1

    8cef8740a7566577a6cccc722a52d2ace99b26c9

    SHA256

    13834a8c9bb65f5a8e997a222c702aa02952091bebaa9998ed623c51cd3308b3

    SHA512

    dfcfe2bfba238feffb6335c273f950f580e99b730b55fdfd417d7dbe9da4732fea16d727d177ffd6dc5fe1999b002e390f25c643e4aa34b67a4d4224f58845ed

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Debate

    Filesize

    79KB

    MD5

    6075c6b0860a8b086041283fca3e2cee

    SHA1

    a4bf052991bffdb3c07bd94802ba0f85e8782804

    SHA256

    3553950da9b3b37ec30f2926b97f1beb7d052bee55c4166af35e51998e854507

    SHA512

    dc63f86cf8db680a272254c98a7a4c398e91d321cc54f5830cabaff88a85041b087a6b7826dddc9cb18596b19dfe54c80de50678c50afb5919ec4cfbc19954fc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Descriptions

    Filesize

    67KB

    MD5

    5aca083a2d75f2a1d139aff39f5d3520

    SHA1

    309b4466eb783998b76e79f81de908ee3c6027c3

    SHA256

    10f969da5e22f0512e758b5033ed425bf7bcbaa91dd6c9de7c9ec25279b0da00

    SHA512

    1db37c21d8172f5cd31e1cc5d7d26cd21347c385e70cb0b81cab5e33b6dd6610c3a9ca318abf964d5747eb5873994edae82f5361969bc7865d145a0374e07129

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Educators

    Filesize

    119KB

    MD5

    b7b88711b513e2127f51968e921f5868

    SHA1

    9ca0e74b1bd88c72486fe5e50582539d03fce87d

    SHA256

    21a77e3b7dfb5ab02558b8e3d548c62621db1db74b37353a51aafdbda01fd757

    SHA512

    66fc4c03f8ac1e02edcf425da1b35fc48df6845ebc21a3846d1a8440909d64467585c0a36a7c78899e99df69e1160e17dcecbc6ef3532447d46f3931ef32bfe9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Entire

    Filesize

    81KB

    MD5

    862871ca3cddfe3e0e96b36090e076e6

    SHA1

    78adf9b6ad776357edb52b8d9f6ea615ac6c75d3

    SHA256

    172b959c6d19d5cca852bb80d15c6ceabce1f1ed979ed4c3c2f63357175c9375

    SHA512

    14267ada39ae46f5e8062b8a4579b223740eae3a5984a2fbb0ae0bd6ae8b6d7eae1f7ff38f52c45693029704e78abd1c5396e95e5f36d5db37bce3a8ac85878b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Fascinating

    Filesize

    86KB

    MD5

    ce4fba13574ba63b632d3083f8d896d9

    SHA1

    10d2b59832125529d51ee8037b71128fc8414133

    SHA256

    49746142381a65a080bd2926606d57756a7d5622c5674513d8a36819ae732a15

    SHA512

    b436c08e1939e8bafaf6f10ca3a9709d664a9a2720897ab55d92c91fe8845459291d5ae7aebc20c2fad00fa71ed29122978477c6e548861371b382205f6d7b08

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Groove

    Filesize

    76KB

    MD5

    e8cd20a6a5c2793d3ae6315dafd89e9f

    SHA1

    c4601ee96f0312356fa376abe5d4c95dfaac4c3e

    SHA256

    4e6a50895daf632779736ee6f0119aa66728ac5e2232b9faf4d81765b1257ac0

    SHA512

    006e989148d5ee1bfa14e14ad19b3041bc80e5972bacb318ec0f3a5f566a8189df496c107cdc8322c61c5aa7662b181447deb9d48e56a7f3ed8a23ab370615bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mailman

    Filesize

    31KB

    MD5

    2cdc981ed4dfef7fba89bd34918ce560

    SHA1

    f3337132c05926a24141ed930af2fd59fe802325

    SHA256

    55050970a16dd09ec827dd3cd7335b77ae2b12c772b1b6da794f4ea2a9aff356

    SHA512

    b01de2c03f54f0085463910fc6d5648011234312aa38439a632b0fa3764d5e90ff5f7988403a9e2db56c97c257edb670359642f5a69e265196c9fc30ba01cf70

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Pioneer

    Filesize

    127KB

    MD5

    e576b56fc95382756b2de4fbc87f0d81

    SHA1

    1c5b02fb9138880b0a1be2aaf8cec79180346c9e

    SHA256

    4a3268a6fefe2a45f0983082c687d4588fa8ae03c568dfb364a4b1415c0660ff

    SHA512

    ea88ff04ec394aed9e9680bfaea63ed76c14e73b51b9eeb2130eba00872b9ad99bd264fa35404e2b9d70a648ff90febe3b6e13768318c0db672c7b0f42110907

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Poster

    Filesize

    81KB

    MD5

    d76ec37c85cff726bb2044a2141ebc11

    SHA1

    41229d11256a4ce41494c89d3451e76c60d5da0b

    SHA256

    60483b9d363c5ff9b3639df7c52ba84134978998b433e0319e2ab946efd8bd10

    SHA512

    d8dc5397fcac5e8d8e427bbb9dcef19e658c050eb8b9cf413f225df4a409afae61c3a6ebc4de3aedf7fa6ad2b3766c523503bed91ea54576b1f9f54006e03099

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Premium

    Filesize

    477KB

    MD5

    fbefd6a35150b1120c9563e81e9f8d04

    SHA1

    28aeac9ead2eda3ef022e25d8f6c0a64c4793a4c

    SHA256

    c82cd2aaa850034a0cbfc9dfe0241bb7771be3a1b8ef41a9239abaced15ef94f

    SHA512

    69788da3d7fb19ff6122461614122df31b634ae38d010677c55c79f8884c8adde183332c05b0b8f8eb64934e91e376272f1fc26f3399f5f839546ed4a0890ce3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Retrieved

    Filesize

    31KB

    MD5

    9862986105585390129f9f9a40de8cad

    SHA1

    70f4386d13dcecc9d93cb60f51e3248ff8c2239f

    SHA256

    8e82859f546069d40b390688ca9c84df25aa7ee02e76cf2a5f3e2cb146a2404c

    SHA512

    7b2e5b10caaf79341bb55b37a5b25c096766a8b2ebe118198dea63e46673491d70e58e6bdeb93237d55065b2ab7886b9ca88bf4668605e6d78c159e48107713b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sb

    Filesize

    113KB

    MD5

    3de0187f428e524195a73fbfb05c3fcb

    SHA1

    1b50d0889d9886f1401027fdcd08b00d0faa9395

    SHA256

    18fa7d706bfb1b1c04c49bc0f9c8be868f167e8610f7df9b5db20a83d61297a6

    SHA512

    fb51ece0cb35fd90ea3008bc9c5d55418cbf76eed33852c2e4c9a68f93a4b8a3720a201f29afcee81c788388d68c6cdf91f365a91645ba9d6cce5857e0081a0e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Scheduling

    Filesize

    73KB

    MD5

    10abf9e32f4840b73fda48a2a374a771

    SHA1

    76bce4fb2dadc4f5623e67bd14f1f6516ec98632

    SHA256

    fa250da2e0430a2879ee804e8280e7f6fafa5ca372b130b7508c7578c022095e

    SHA512

    cb8944f4f031b492789bf9712552dec1ef0ec9775e0a859bbfd95be00ea516b9b10cb31e9876fab5b2d8157e29b2dfda434386d6f6939c5490cae2fcb5078cae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sk

    Filesize

    109KB

    MD5

    098a60cb2ea143db473aa4ba07cf2ddb

    SHA1

    f18d6ccae4e139cb2ffc6a2c0f16385408f4e8a0

    SHA256

    908b55de345dbf32ec8181925815d81a18ce33320990993493a0676498b7f592

    SHA512

    eb10c6c0df986351bedf36e35caaeb2abc6749e7921588d8c374888770b61803db1fb023d02c1a6f9b11a8380a2f9bacda4d148babcb8a27d539e657390cc725

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Stories

    Filesize

    68KB

    MD5

    2b4e748bef9f2357d0ff96c2a48a707e

    SHA1

    fe01d0b8a6df9fb298afee2b7a8119890394b4c5

    SHA256

    ac7e540a3bfa0f2c3dd596614c72a6ad1ed3492f66462086ff9a86b5a00bb5e4

    SHA512

    eda25b10e599ef2db88b0f53a0bd836efdc74314b523f600abaa40c17f8c065da1967be7073adac15891b6d5e37f1291b0dccee9f05099518e6aa558cb0cb8b4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Thats

    Filesize

    91KB

    MD5

    c350429b49e4758264af8b91c3378db1

    SHA1

    63bf228482985fc358fad824d2c2afb0ee1f4895

    SHA256

    fbb96260a900a675a3f3949ff61f295789ef6592dc39fc910f220f1438db0277

    SHA512

    0ec46c3c6eaecd66ca86299e2a369e99f9d8144772010d81d62217f3bb805e2ee385c990f585f18a9ab21c7baaf1652404ad81542bed82817635ff3f428fc80c

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\221480\Fires.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/576-72-0x00000000033C0000-0x000000000341B000-memory.dmp

    Filesize

    364KB

  • memory/576-71-0x00000000033C0000-0x000000000341B000-memory.dmp

    Filesize

    364KB

  • memory/576-73-0x00000000033C0000-0x000000000341B000-memory.dmp

    Filesize

    364KB

  • memory/576-74-0x00000000033C0000-0x000000000341B000-memory.dmp

    Filesize

    364KB

  • memory/576-75-0x00000000033C0000-0x000000000341B000-memory.dmp

    Filesize

    364KB