Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    08-01-2025 12:56

General

  • Target

    Nexol.exe

  • Size

    332KB

  • MD5

    bc334056c86dd959ea3669c4c6f3701e

  • SHA1

    02babf7c36e62232403dcf76d035a96245b6526e

  • SHA256

    3efec1c708fdf1aeeb13308835684945746b79eb7012c5770b7f2c12d00a5bea

  • SHA512

    c342bbdcc02e14c115388956e3897a0de13099782501ade55862a18f772e8c04e36aa8ef2c2d63c67746a8a9d75c0f36bbbb2dd749d5c278699e41f0c40d6823

  • SSDEEP

    6144:thrnw2U+rkamz3p6945FjFizZ91hqtPYEy+vWLPMIUpibTMnfw7wCWlmbMNw1/m1:tJnw2Prkto9Fz2twE7wPxUsTKwnfbCwm

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

Extracted

Family

lumma

C2

https://soundtappysk.shop/api

https://femalsabler.shop/api

https://apporholis.shop/api

https://crowdwarek.shop/api

https://versersleep.shop/api

https://chipdonkeruz.shop/api

https://handscreamny.shop/api

https://robinsharez.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nexol.exe
    "C:\Users\Admin\AppData\Local\Temp\Nexol.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Users\Admin\AppData\Local\Temp\Nexol.exe
      "C:\Users\Admin\AppData\Local\Temp\Nexol.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4864
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 296
      2⤵
      • Program crash
      PID:4556
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4600 -ip 4600
    1⤵
      PID:3144

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4600-0-0x00000000746BE000-0x00000000746BF000-memory.dmp

      Filesize

      4KB

    • memory/4600-1-0x0000000000A60000-0x0000000000ABA000-memory.dmp

      Filesize

      360KB

    • memory/4600-2-0x00000000059A0000-0x0000000005F46000-memory.dmp

      Filesize

      5.6MB

    • memory/4600-7-0x00000000746B0000-0x0000000074E61000-memory.dmp

      Filesize

      7.7MB

    • memory/4864-4-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4864-6-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4864-8-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4864-9-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB