Analysis

  • max time kernel
    90s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2025 02:51

General

  • Target

    auto mouse clicker murgee keygenl.exe

  • Size

    794.2MB

  • MD5

    bdfe5b04221a023ee0130a9f1eefe7db

  • SHA1

    41dd8dc9a176542eb65992e857ecfd18c00c1e4a

  • SHA256

    c8694b7ed78223bc8167cd05393579700bb4a3a890ba418b6a13d9763d9a04ec

  • SHA512

    d1ea5d66ad03cc6c9dbc2bf5fa163822b4bd596a286cfc0f32e3e4d9a157804dad6c355f2154d6cf037f2d20258f0e8526ac4cde20f446b6bebb69413dfcbc42

  • SSDEEP

    196608:XWXHBjOxHpnjbCnJ2lVfOtymJU11R5zVwCJlWmQ73toowXrR9ZItL5r7jEGSbDaW:XG1OxJP+Tw+GVYGIL

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

https://desiredirefus.cyou/api

Extracted

Family

lumma

C2

https://desiredirefus.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\auto mouse clicker murgee keygenl.exe
    "C:\Users\Admin\AppData\Local\Temp\auto mouse clicker murgee keygenl.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Tubes Tubes.cmd & Tubes.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4000
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4872
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3964
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3920
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3052
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 125203
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1268
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Places
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4772
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Payday" Handjob
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3120
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 125203\Innovations.com + Ecological + Eagle + Initiatives + Barriers + Witness + Diameter + Hitachi + Dp + Selecting + Freight 125203\Innovations.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2572
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Burn + ..\Paperbacks + ..\Moms + ..\Pensions + ..\Salaries + ..\Stanford l
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3696
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\125203\Innovations.com
        Innovations.com l
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1932
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2404
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4392

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\125203\Innovations.com

      Filesize

      135KB

      MD5

      48755c92871b5e9604d22265b5435cd0

      SHA1

      d44902d14e94542e3f4f33a79071a71e32fed172

      SHA256

      c76b3b7e610e48fb5c944b533295661b30569990028a471660a674403d12caa4

      SHA512

      7a1b3dd6de63973703b029681e4b05fdf006beeb9b0562c30d7e70bb6aead8d5032c08d605ad1ce4a466f49e8ebe2b36f028c4342c5112abccb71045856fa35c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\125203\Innovations.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\125203\l

      Filesize

      474KB

      MD5

      7861272daf4aa0098c07d7411d3f92b7

      SHA1

      9597f6b3d455fe77702d8a3bd4c36bccd9432c5c

      SHA256

      3896aaa7d21442675b485e68da00a6fbb29880e3addf3d27448a8980400ea166

      SHA512

      9228ce3c2d20a65acc9e5a48fe1b79554fadf6f004984e791d280944373c39e3b3baff7735c04986c63f712fcffae3bb03c1dc7645eeb0b59b7bb9e5ab00af2a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Barriers

      Filesize

      121KB

      MD5

      ca5e26e63c61749139083ea988e7433d

      SHA1

      659f60d4ffb66e3aa784a8783aedcc48442cb091

      SHA256

      63228cb98b2473eb9e8039c032c1a8313276f0cad398d78df1cbec476dd07588

      SHA512

      bb46c55b8f2db68049286e04a8065bea46d5cb1dd010afb2ce3c4401f19dd416c7fc83380b997a1101e7c38ff56ed444a2b1530b261af7478c90fb4c52d52392

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Burn

      Filesize

      84KB

      MD5

      16910969da24f4a97a67c963e7fe6e18

      SHA1

      48416623261f9c939ad9c900938e263c94005154

      SHA256

      e8ed4e9e2231c1b69ea8968e1c79c797af988d108b315bf0f785674902df34e5

      SHA512

      3df13426752fdffd2984b3c7621f7a6a341814f2703efdf69abe6005deaf46b03846757d0c952c8ab4eb25d65a23823de4e57a0a6fa9e99f5977d9a8d5a429d9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Diameter

      Filesize

      64KB

      MD5

      db8adeb8cf730846c713bd1ebbc5468b

      SHA1

      a19deb191b8191ecb5397a7e5ab6b9fc64ebaf59

      SHA256

      2722dc623826dcc495878620dbeac31af477c4a0c85e4da388dff0bbfc50a398

      SHA512

      aa2aee71680cd7f60e632f029807aefee00d9040ca526ec1b782498dea357624ce9ee3592ddabcb2b9d84d615a59e2714fb9925eba62aaaf09f70468aaecf468

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Dp

      Filesize

      135KB

      MD5

      f73540508edfb615775ef84fa40cf5fe

      SHA1

      f3f2a99a6ce195807d810b607c9f881b1d38bff1

      SHA256

      c4bde51857d97490941720c77e448fe4a533e9ad5477ce633097de405a93871a

      SHA512

      b0821e1bb6ce98ac0e552c10f1510205668aa097c4f19a3acec9ddb96f52ff1650403fe9344d2b8fd8b5490bc75583f000f82c0d6e7b941ef3e06871f759df55

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Eagle

      Filesize

      100KB

      MD5

      df107f4311274be0a781f18eb60f1aa2

      SHA1

      193b1977cbcf008ed5c20a60067523264033535d

      SHA256

      b48c5a21a7490d2eabe2f0dd07aa4e00d42d2dc911f11f70a80e42b2eaf0bebe

      SHA512

      90fa33a151b8fcad35a7a6ddd179454f5c8a1da811ad44f976abfc90f3b937d60d47393e5a0acafb800c523a2bf849172be9863a824b4aeb08def719c4fcd095

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ecological

      Filesize

      133KB

      MD5

      d62c1dc3968ba216fb63f20c0c221f47

      SHA1

      db5bb334e0c0e67cae8fb76862f2b2ad2a8515d1

      SHA256

      62f1ca51f1f94f7b1c6c079cda2d5f7fb7b58a12d94dd995d5079d53e67f7de8

      SHA512

      266b0e0fe79e013a74fca51082f3e07e469ecf1cba76f7d9e961188bed53cbb0f26cc3f008f82e1dbbfc3eac8775074fa703659d2e72043aff3054ba97afeb34

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Freight

      Filesize

      21KB

      MD5

      6e691572aa2f1658617edeb575a9b54c

      SHA1

      0803fcff1b3315c245a854ce4b9e42b20edf9391

      SHA256

      44d6571eb71090fb8abd0b038995f25e12ab151ae6a4f6477702e92159f66c6c

      SHA512

      bea4e6026b14fcf5eb244d209d414327ef9a960d559b20d4b251f8f1aef9a715b18d99915452d045e409521df0da4b90866070a86ce27c3d2524c176c4d707e4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Handjob

      Filesize

      2KB

      MD5

      904cbeb6b6fcb6543095c4df33f700d7

      SHA1

      f9750ac88e2f000f954887e28810939f214e0be1

      SHA256

      4782248b9e73ff5b33aaa8ad0f850a22d0e9c56b738c77fc9c645d9f1e710f90

      SHA512

      e1eb18c126954a8ec7600076ade8f53481d40914d725441e1638ed33b41a991eeed56bcca087d788d778a7094789b0f068d6483c79bfe03eb8d9d6f9f6a37cee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Hitachi

      Filesize

      52KB

      MD5

      d27814d981f83abb6b9b1a833e00f528

      SHA1

      3f3976a93b941a0825bceaf4b4db942dea40a46c

      SHA256

      f2179d7b1e97b40af140a89cee496e9f3e9f34395c21440f144878209711ef9d

      SHA512

      094a7364f19b3c39284809ab50e22f7bac6751360db7367e520c87fb8fe52b858c142ce193732f6115363ae915552c54454cc735a571ef973d0e9ef524b92e17

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Initiatives

      Filesize

      101KB

      MD5

      fa8d004eeff2a39be874a1dfc0e13d29

      SHA1

      6e882516e6d58c7bf711762201835d1a482910bf

      SHA256

      138f1d0141bcda52ee29b28fab4727a584765e0fdac087f6e0b34987c8cf2a3e

      SHA512

      af6f43fa6b6e4f0feb43afc96ffcefedea1e654f7cd1c9464f5f70458ff5677adde79cdc5243a77fae306bbc41627109a3ac70d687076abaed7ab35bcc6291ce

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Moms

      Filesize

      99KB

      MD5

      ba53903918a4ba90871decbc9ccb81fb

      SHA1

      f53f16d50faa0893d6b6264a503994fbdda70395

      SHA256

      62384fb88103d842dfc2a726f969017b5bb6ee432206061dfdae8e7c191e170c

      SHA512

      04aa69b0c2a74626f6c5a55c2e6cc8a32ace993847c2e29452202f58c80a30610dadaa43d6ef8d26cffe3b0fabe70a5bdf3a5814ffefe9907c4cd62e19cbb410

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Paperbacks

      Filesize

      89KB

      MD5

      05e03d7da0e9b5576363e42af0b2c8ad

      SHA1

      8148210e57cdac4d976a62385310223ac857a0c6

      SHA256

      021f43d1e8254c3ec6a322211128f1fcf67c06dae0534e964d1f49995889fa9d

      SHA512

      730ac917ee01d02a8a554aef65dc497992d821c2edcd8fc772977378b06bf97019310bf984b472ab5f9a650dcdf400824db7f7a446ac7106a91f5f92af972790

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Pensions

      Filesize

      64KB

      MD5

      4fd5be9d8a4776fa1b403031f377b829

      SHA1

      0426cdf23571ea86d4073273a2ac08d453d110ab

      SHA256

      b32f0d076cc361c99f004afaeb85e71b84f8e9388e62c2a58bebe3f36d458715

      SHA512

      bbde199e26e3a6e71543b6e352442da4e3db839b8afcc462c5db52ba7999fdde7f90f7aa3f8c18120ef3035e1f681517127195b67d6a396058bdbe1d2ecec07a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Places

      Filesize

      478KB

      MD5

      a9b7ecd1288642968dfe06d66564fc47

      SHA1

      94987c82320538b66d7671b101cfb958063582cb

      SHA256

      35a69ea76294688bfd7cc390cd4d6dcab5b8071a4dd62c4d1134ae33453c2dc1

      SHA512

      99bfbf999b5d64920f0beac4df37d7a21820aca0a6c24693ac94ba5c62cd1dd8ea69d09f74d854cbc7ab698656c49221e454c22147d9d5bdbb9cde82f65ac733

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Salaries

      Filesize

      99KB

      MD5

      f8938ff73f893b3974f1d7a955c8d30f

      SHA1

      961921ce9f2d9f96b5a897aeffcf62ed0f69b5f3

      SHA256

      3531630f6cf59afdbe5c853856262923f67d662f509ce825a7839a0f5d97068c

      SHA512

      5cec2cc85be9ddc11a292b3ecf67030199c0c15f6461fe03b7132fe4ae7cd2f66f614e33eb5cdec83a80e95bf5eb5614a91ca1520b0b6cc6ae39185684bb2d5e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Selecting

      Filesize

      65KB

      MD5

      88996e59c981d93fb8667a1d81b978e9

      SHA1

      42c97a80c23f33fba5cd080dfffd62139d566c3e

      SHA256

      a11a61bbe4f0a98e4d399541454e0eef4a77a410c47d93495e37d7b83d50a106

      SHA512

      6b4a4ca38d5f25abf9a2ec415070cbe33c7ff69c3da2552668f2e70d0b7c90aa53450369aa64a07de0da2d68260cf78e6423a70da86eb65f9395ca106e0ec4ca

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Stanford

      Filesize

      39KB

      MD5

      65d506131b160e8bde049b6fd670c80a

      SHA1

      7dd6f5d88e647a950a75d9897298c93fb1a6b03a

      SHA256

      4297d72fcb8697e56af0b4b48fe2c0d4d2f5dfe843a293a592f16847323d2e2b

      SHA512

      f22b1c454b93a112c995c3f8cd109973210a452fad4d08ec0f46724d99f1ac1a52fcbc596afe250bf84dd13b4b9845a3f7621d31c6fa8272cb3420181eb6c5f8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Tubes

      Filesize

      12KB

      MD5

      cc1e731d16fbd7f0df25986a7815f9fa

      SHA1

      d3f4ac24f82f5414697845dbc3f4910673dcb004

      SHA256

      a320e62855ef736849be24c9b24913f66c0f2b928281bddcae80b770b5fa491a

      SHA512

      4d9e94d23d07deb64384f32566b043ffefe94019896c6160ce20513b58264f3284f228ce3e0d36732b737ac8010ef233f8c52f48dd07eeed75377110918e08f4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Witness

      Filesize

      130KB

      MD5

      206be5267096dc0ef7aa912ae8ca1193

      SHA1

      3770d9ebc8b5eddde1b8ccc9bd91fb39bb9d29e5

      SHA256

      b6ea8e1f6b0bbe14bace4fe41d6814ac02c2cfca767472e913a859c9592be782

      SHA512

      701976cdf959696a6d20a1d1cf27106bf5713186e368849a7decd3f04d7d644393ae5dab9f6914dfd301c2314dc640fbb2a244c2a9d91de1c53077bc4d532738

    • memory/1932-68-0x00000000045D0000-0x000000000462B000-memory.dmp

      Filesize

      364KB

    • memory/1932-70-0x00000000045D0000-0x000000000462B000-memory.dmp

      Filesize

      364KB

    • memory/1932-69-0x00000000045D0000-0x000000000462B000-memory.dmp

      Filesize

      364KB

    • memory/1932-71-0x00000000045D0000-0x000000000462B000-memory.dmp

      Filesize

      364KB

    • memory/1932-72-0x00000000045D0000-0x000000000462B000-memory.dmp

      Filesize

      364KB