Analysis

  • max time kernel
    78s
  • max time network
    81s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2025, 04:40

General

  • Target

    Cod Bo6 Unlock All (by Anime lkigai).rar

  • Size

    62.5MB

  • MD5

    ac99b172840d552e1e1f5fde544bd3bd

  • SHA1

    326b2ad1e21fa8461d5bc1ee6834465e84d7cdeb

  • SHA256

    b68d3c409871a9e68208a99c52b5d7d23ee6b0f51a7717fa06e49e579d73c100

  • SHA512

    e14cea62de336e89580a7ce898c52f07bd80ab98b7ac6f6638303941d3c75d5c2419b5d94ada0863d9c0d52f8602e70284705b092829ab6c2da43657631550d4

  • SSDEEP

    1572864:z0letFJ6kWphu+Dgng9YyMP61nm4rCoUh+3l06tecIn6P:hFXWG+/YyMQlCoUB64XW

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Cod Bo6 Unlock All (by Anime lkigai).rar"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\7zOC6817E78\Unlocker.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOC6817E78\Unlocker.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2948
    • C:\Users\Admin\AppData\Local\Temp\7zOC6830FA8\Unlocker.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOC6830FA8\Unlocker.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4256
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zOC6817E78\Unlocker.exe

    Filesize

    5.1MB

    MD5

    ed721b1b65deed8892433cbd15f1d0b9

    SHA1

    8f2ce6ef490912cffcda6b4d1f85d20e59431ea7

    SHA256

    e20b5a2f6ffc11f7f98c13e4a8572815172d6159a65e0d6eaec0a328dbba4665

    SHA512

    451c9ee9dab86822320a0a717b487b56ebd10e287ebf3f865dc8efa068c0249ebe563822438bdaf08bbe058b78d703f256043129e656ef7e379ab4573178b922

  • memory/2948-20-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2948-21-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2948-22-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2948-23-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2948-25-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB