Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2025 01:20

General

  • Target

    fb3e0d7aa822c1027373e83e990b07da37dd9f184ef1762cac18c89160940136.exe

  • Size

    70.0MB

  • MD5

    b882bcb81d94886f4a4ca2a6b9c82ed9

  • SHA1

    4dc7d523019dcfc7d18c7c3fd0bbae5bfa4183fe

  • SHA256

    fb3e0d7aa822c1027373e83e990b07da37dd9f184ef1762cac18c89160940136

  • SHA512

    16c9fd00b78bab60ed776a6fceda54f1ed7d7d452e85ddaecc77004e3d5e12fec5937154de1692d235c58c2a24e04b4808389d1ed61178414086ef6fe43c3058

  • SSDEEP

    24576:zZYGX5mWfodObJblG3uWkkCOo8PlfAQDCurRM5M+:1B5mWwdyNwfkEpV5uM+

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://miscreanntyj.cyou/api

Extracted

Family

lumma

C2

https://miscreanntyj.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb3e0d7aa822c1027373e83e990b07da37dd9f184ef1762cac18c89160940136.exe
    "C:\Users\Admin\AppData\Local\Temp\fb3e0d7aa822c1027373e83e990b07da37dd9f184ef1762cac18c89160940136.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Polished Polished.cmd & Polished.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2636
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2836
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2604
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2612
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 448947
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2680
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Mess
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2020
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Opinion" Librarian
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2080
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 448947\Flavor.com + Provinces + Respond + Sync + Profits + Liable + Bond + Fairly + Gives + Reviews + Smaller + Slovakia + Requires 448947\Flavor.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1320
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Talented + ..\Corp + ..\Albums + ..\Cindy + ..\Substance + ..\Citizenship + ..\Implies + ..\Vocal x
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2964
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\448947\Flavor.com
        Flavor.com x
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2968
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\448947\Flavor.com

    Filesize

    2KB

    MD5

    f90b2b9a56c08f7e4b14a1ed415938f4

    SHA1

    b6e4f3402cd341712f093194ac27d730ebd70e6e

    SHA256

    b78a4f84ffcd6b681a1bd3207f3a70e41aba03856c44e6244e4ec8a5d5df18ed

    SHA512

    74068b7e2847112ec0198cdf2d946d2116bf1d5fe8e1da29ebed79ade7f75f57fc6bd36d320de62f6561dd799bb444e631093580fe1528839bc375d4613306fb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\448947\x

    Filesize

    484KB

    MD5

    fd959f08c8eee3519a171919fb9b512b

    SHA1

    637fa97240a362bba0dd9e15c530ac85c2a82da1

    SHA256

    fd43b33e1e9a60fce4d3067470a5ce10b4b14566f91630f1f228e4d8693c9b8e

    SHA512

    3c3736e66ea6962a8e4948e16aec6d4d84731c5e186323cd44477620c2cdf0cfee1dc87311440ac85d5a9f2f48bad5bf62b2f59a8f3005bb5b2e18448df383fe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Albums

    Filesize

    69KB

    MD5

    1419923ea980b6f8db7c3adbb1978bc0

    SHA1

    3c23fa0b67bfe2101dce39d7691ef19f5cd0e747

    SHA256

    db9103a95ecc3f096915ba6a8e980beeb0e2947fcc8b4376c735bf44f184c75d

    SHA512

    3e225e8b6f29b30089a3e655c8fc2a0445beda35c91b801a156d60365903dd9c4579f0f6f3e22dfff8fee67111d3e350d8675124c817fca6b842c077b050e7bb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Bond

    Filesize

    78KB

    MD5

    bb62f98572981fa5c11e209bf250eb87

    SHA1

    8d12ad4c3c77e4c2e50020ad5149851281684268

    SHA256

    461808360c76f0f5e443d3895bcbf3768bb0e0f4076395fb445847f6e47c995a

    SHA512

    a9cac812627cb6b6440eb17b5f7852fc014346ca67c8ffe55289b738eb9365fe65c97ea7ba3dbbca777fd3c6dde111dcfd106c99c1caa31bea05fe6295cf4e75

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cindy

    Filesize

    66KB

    MD5

    d8a227518768ac36b970e6c0313d14b0

    SHA1

    8ce18bb0bc10a1f4472bf80255f78e74da33d38f

    SHA256

    168866a29a88132d04a9693360e5e2ccd55d41ff9777910f1a3284b3b9c3fe38

    SHA512

    ebc7a9321046004618308b0cc23c7bdc084c6f7daeabfe9525baa9467d07b6c6c51bad9f2f0fedc7b9451fbd61b25726e90911c1058fb1e38ea81c634b8c4685

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Citizenship

    Filesize

    52KB

    MD5

    02027c4550541e7ebfd57b906b250935

    SHA1

    fe3c02f2cc4116b6c2a9e8c0a3dca2910c5f784a

    SHA256

    280e2831222dd1c704ed4b7fff23bc669b155936a2bfc488af45a2c89c684a2b

    SHA512

    78af05d66cacac67130bb29aa20921317bd70d1254f5e846187083619700c655656b543a7376d4b2809d7356b19702bf3d97e335aa753377381759f7ec05876a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Corp

    Filesize

    54KB

    MD5

    1dd5a7b630803ffda404ba7c1eb67fbd

    SHA1

    9b1c38be2c2beccf6aa06b59b003fc0a4478ec1a

    SHA256

    24e8c645fb892ee1dec47cb1afc93664d752222a13d97165d3e96d2086befc1e

    SHA512

    98c89ba3865a9a448b4499907f67cc9eea11479911bc09893aa00b507949acd876568163e94e5740e3d58fc174143d0ee59ee2e1a128503c679ea01eb066fc9e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Fairly

    Filesize

    99KB

    MD5

    1234fac1882fe366ae82fca42792a850

    SHA1

    5e563ccad95012356ed989b265f5c4bb001598f0

    SHA256

    208f249b84b326080508848314b89ef587af0879df8c97e3acb6830e5b33191e

    SHA512

    ac0f3d9cfbf4692e31e412aa60539894ec97d32a8a4d5cd2fed61ee535120039194feb78dd9f8974e02f78951bf5701e3498a85fc42cf5164017dc8fd5e81417

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Gives

    Filesize

    83KB

    MD5

    efc7dd3c4cae9a656fd78fd89011354c

    SHA1

    9670d36e6f5a6ff94eb898549fbfa1081f1f4127

    SHA256

    c494e2c3dee60c27b80e56002c5b87cc4a17e5e9796158920fd6a6efd5402442

    SHA512

    81e84508fb23e4ce5f74c04a17dc49ab9a3a3c9562e4865b523f14729d7ae44e50c38d03f1b54b43c78ec9ba6379171038fe8204a05428ff9223be59989d705e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Implies

    Filesize

    88KB

    MD5

    f3bf8d1a02e838aa350adbb34fb35bc5

    SHA1

    7178b9f6b40a50fc27e6f6411dbf7a5b4f611113

    SHA256

    783a6d329fb885d6eed8540cef4986cbe72a6d4e228023c68d125ddb569c559c

    SHA512

    69d141ec5586c009bc7a78c69175e1c88733dda43fc4dccc485eb3e9a438a21c3ec5f08d7d059924ab9320df40edab0ced25f2c8dc3d61b7749afe731ee17c22

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Liable

    Filesize

    84KB

    MD5

    3c36fc88e40efa2dfc669a3d2f545203

    SHA1

    f2934ee5588a6916bf1b9badca63fb97a581715e

    SHA256

    133a3819d55204a3c60193a847a524b653f7a014d6bef1a3a127c7d4ba7877c0

    SHA512

    49f192a83e85fc59ffbe25c5855fee3c567e5106840859ce5889025251355f49f389855df873fbb8efb05089a6877614abd6647ec0a7c4ebeed14ec4e95aa5f1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Librarian

    Filesize

    2KB

    MD5

    d1305fde02e37c9352830b085b85e7d7

    SHA1

    14b3a89e66e420a74d304177751f894cd40aae8a

    SHA256

    8ad445cac5504637163b146e6f05f51ee04541ea1a44efea021bfad252b5a46c

    SHA512

    8d7ee8841218216f80ec0a19f1d38c996d62ff1dcf12f46102c46b14b07b33f9c0b3d9e2f053a7d9188c9c710d941bfbd2470c84c023840c393b438db4910625

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mess

    Filesize

    477KB

    MD5

    1168ca043671ead467b937d92d2a8a5e

    SHA1

    18c2e9f3fb386861ad701272b726d9ba767287cd

    SHA256

    7634446569dcbc0a028f83eff0d2c2b086b74a518d97c930436899ef9792393a

    SHA512

    ad4ef8732ebf78bb541334657b7368e09d3665ce9fc700bfe55166ce391fb5044e4bc02c090f07fa4288cc4f5f73d051a774e9f0ced55d1d952f2fd896f7c146

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Polished

    Filesize

    21KB

    MD5

    575485f99192e2890efec242d39b796e

    SHA1

    39c3bf2f6a4e11cc15e07259cdf842acb514f62c

    SHA256

    1fdcda2a38d787f371df41e45dbdd12675f81ec27e847c25ce58166cff1ee3fd

    SHA512

    a3ed9b7446993410d751b1b95cf243d2baaec62967d7e8accca8e6cf4ac326dae0323ab768c00c19fd23988d868fcac75c82c18296f0ae704b27459236933e5e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Profits

    Filesize

    66KB

    MD5

    b159582d6d8e7d4ab71b48061816972c

    SHA1

    b3def65ddad49bbc015ab61e4b48fdc7561e7740

    SHA256

    84beb646cdc917391e2156a4d314d3be47dfeca1fdaa8e8e51b435f89741d62a

    SHA512

    e3285bfec73c25f3c253cabd03894eec5c913c85488955ce0b95a90aac9935cc92c17348eb49c1887bb7053154f845b3a2f1882f88a31d154f2ebf17bc21633a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Provinces

    Filesize

    88KB

    MD5

    052c8c9fa6bb2bc6f149c5c99f2eeae4

    SHA1

    cdbbc14a285f0147eaaa7cdeb498b3dfbecee633

    SHA256

    7030ff92f465a2a6900dfe6cbd78c75fecaa69955f81f6b745b58fcdf03c9e87

    SHA512

    429ff51f1057946e9df9ed25e14457e0ee5997829a1802baa27985d279ed21b86afa6288871423812da3388090fbad9a269ea63170f5d91a5113aae88975afac

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Requires

    Filesize

    45KB

    MD5

    5eb416b46f91b84d253df0ff9d401658

    SHA1

    4f439a650a464bcc5668448ac33e5e4b4892ce07

    SHA256

    9ac8fc0213218ddd3d43348814d87cccdc8722ac9c51552df12459c835961803

    SHA512

    6b741da0c9f39f7f1b4feced819f6c4135213f950340daaf17ff434bb52f7046051c494a2557542a3c8d7a050089e51ac9c26f9979e4bc293a7998f815fc3e71

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Respond

    Filesize

    52KB

    MD5

    68d2a2937abbcc9c6cef76b414a0b351

    SHA1

    c1df7abde305888ad3b7dd208ff54886c917bd0e

    SHA256

    8fff4cc4f67b145f59ba06abc2dd0530f0b3994c5dc7ffe1b908a4f446dc014c

    SHA512

    da4183ba34ce7f58aefdbd1a03563e307824243020d8fbc81f06165a2cb48062e8c5bae199f6e832c2f145a22b18fadd2d5229e735674a61845740fb8da6d76d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Reviews

    Filesize

    70KB

    MD5

    735f46985415696770cef4cedb109c6a

    SHA1

    0d65b7573f4b1d85a6c4975c78ddd349e3152bb2

    SHA256

    5e17f0d4a447e42dda95cdff204cf72dc43818ae926d49ea32136353951f6da9

    SHA512

    f111590aacc99dfd5d9fa6f55f0cdb6e8eb1c2bd35b7bbcd39a1f4f260702380bfcad3bfefa68fe66c058edcd56b67f7b39ca12ab498d9c4352dc718d00c5931

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Slovakia

    Filesize

    50KB

    MD5

    b2f16825e8e8a5f53b4b3095d9733f99

    SHA1

    ff885eb9eff63892e21bb0b509e82e1606676394

    SHA256

    36b7c9f5436320972cda5291e36a8dea59df54baf15bf04dbed73250fd11a239

    SHA512

    fd74c21c72cc325182c12690686c491ab7e2fe295881dcf7c4257137e0e4aa3bfde6fb8860d69528a50904ca1a0d27e23d60a471d50e3c0cf0a3cb25ada80a3b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Smaller

    Filesize

    100KB

    MD5

    2e788f30914b033f8e93d47218787d7a

    SHA1

    8eaf29d6ec08e4a7c0ea3a0302ee2ccb5b2f37c6

    SHA256

    1035e07f2f5929896029bd5cbd9c92466118b51efdecf9301df1feef45bb0fa2

    SHA512

    2a5095c9f4dfd4f863322c9783ac9a16b9ccc89de519ec47b9d30f6574f6c086f2845558440e6dc0d2de001b32ae3d96495130c246eb7baccb4610b0533f2007

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Substance

    Filesize

    73KB

    MD5

    3695019cc69f9da3f8c8ec1550f6c849

    SHA1

    7904bce1ba02cd7ff93b4056f9a58567d6e14278

    SHA256

    84333dceb6d704b671278a55b66150ba30036a146ce97b97aaff25db37bd4186

    SHA512

    695daf96b309dea5f1509e28bf45695ae9cd63b7f6ba8b276692c22edb846e7227f3bab7de7dbd6c1a5f1605cbda93d7aa8fa8234b4237e342282505b01b2473

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sync

    Filesize

    107KB

    MD5

    3818b633ae3606637b55d1b57dfb9c6d

    SHA1

    a3d86c1155456e33d4ee4238c5b4e75d00d105d4

    SHA256

    f3a0fc7c306f7c52921fd04fd78ab43eb3421ba57132746b5e28cdd3ba9508c4

    SHA512

    709058946ebff876a31f2f7bc6757be8aabac32d25e06e5d927c2bc18cbc29986b5fed2f0dc5468cd7167d73ee747d09a56c337d0cde17e570fc141edc6c9d6c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Talented

    Filesize

    80KB

    MD5

    bc9fb8d97a11148bc16c932e5447076e

    SHA1

    47f337a48143b67d3d74f28d395a39c2bdf785ec

    SHA256

    30a569137466d258d0a362cf81a282d47ad3b70d74017abce4d352c6738cc50f

    SHA512

    b71c1775bcda67c712aea4d6b9bb57d6df0b0c45bbe792a82a95d0b0bf1c4591480656a7c9ee12067ea943d180a5fd922a57d30116dee6e12bf404689b24650f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Vocal

    Filesize

    2KB

    MD5

    e532fc4672b7dc521c1b45dec3b0afa1

    SHA1

    61e3c139c80353e3a86beb86c79ce043e1e0c3ef

    SHA256

    94499089c580919ea193fad97cde5549602e238fa073d43b35cc153946264ee6

    SHA512

    01808eb98b9d0f742fbcd0b6beb9992ab6383b3a2c3d90a2d1753a5095326708b75726332f54016b4df08b8c9434ca0819b50ca6cc323a4c767fbdacdc6a6ebe

  • C:\Users\Admin\AppData\Local\Temp\Cab44C0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar44E2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\448947\Flavor.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2968-81-0x0000000003630000-0x000000000368B000-memory.dmp

    Filesize

    364KB

  • memory/2968-82-0x0000000003630000-0x000000000368B000-memory.dmp

    Filesize

    364KB

  • memory/2968-83-0x0000000003630000-0x000000000368B000-memory.dmp

    Filesize

    364KB

  • memory/2968-85-0x0000000003630000-0x000000000368B000-memory.dmp

    Filesize

    364KB

  • memory/2968-84-0x0000000003630000-0x000000000368B000-memory.dmp

    Filesize

    364KB