Analysis

  • max time kernel
    93s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2025 09:43

General

  • Target

    auto mouse clicker murgee keygenl.exe

  • Size

    794.2MB

  • MD5

    bdfe5b04221a023ee0130a9f1eefe7db

  • SHA1

    41dd8dc9a176542eb65992e857ecfd18c00c1e4a

  • SHA256

    c8694b7ed78223bc8167cd05393579700bb4a3a890ba418b6a13d9763d9a04ec

  • SHA512

    d1ea5d66ad03cc6c9dbc2bf5fa163822b4bd596a286cfc0f32e3e4d9a157804dad6c355f2154d6cf037f2d20258f0e8526ac4cde20f446b6bebb69413dfcbc42

  • SSDEEP

    196608:XWXHBjOxHpnjbCnJ2lVfOtymJU11R5zVwCJlWmQ73toowXrR9ZItL5r7jEGSbDaW:XG1OxJP+Tw+GVYGIL

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

https://desiredirefus.cyou/api

Extracted

Family

lumma

C2

https://desiredirefus.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\auto mouse clicker murgee keygenl.exe
    "C:\Users\Admin\AppData\Local\Temp\auto mouse clicker murgee keygenl.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Tubes Tubes.cmd & Tubes.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4396
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:712
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1328
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4260
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 125203
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2296
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Places
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2044
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Payday" Handjob
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4732
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 125203\Innovations.com + Ecological + Eagle + Initiatives + Barriers + Witness + Diameter + Hitachi + Dp + Selecting + Freight 125203\Innovations.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1772
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Burn + ..\Paperbacks + ..\Moms + ..\Pensions + ..\Salaries + ..\Stanford l
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5072
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\125203\Innovations.com
        Innovations.com l
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:452
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\125203\Innovations.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\125203\l

    Filesize

    474KB

    MD5

    7861272daf4aa0098c07d7411d3f92b7

    SHA1

    9597f6b3d455fe77702d8a3bd4c36bccd9432c5c

    SHA256

    3896aaa7d21442675b485e68da00a6fbb29880e3addf3d27448a8980400ea166

    SHA512

    9228ce3c2d20a65acc9e5a48fe1b79554fadf6f004984e791d280944373c39e3b3baff7735c04986c63f712fcffae3bb03c1dc7645eeb0b59b7bb9e5ab00af2a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Barriers

    Filesize

    121KB

    MD5

    ca5e26e63c61749139083ea988e7433d

    SHA1

    659f60d4ffb66e3aa784a8783aedcc48442cb091

    SHA256

    63228cb98b2473eb9e8039c032c1a8313276f0cad398d78df1cbec476dd07588

    SHA512

    bb46c55b8f2db68049286e04a8065bea46d5cb1dd010afb2ce3c4401f19dd416c7fc83380b997a1101e7c38ff56ed444a2b1530b261af7478c90fb4c52d52392

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Burn

    Filesize

    84KB

    MD5

    16910969da24f4a97a67c963e7fe6e18

    SHA1

    48416623261f9c939ad9c900938e263c94005154

    SHA256

    e8ed4e9e2231c1b69ea8968e1c79c797af988d108b315bf0f785674902df34e5

    SHA512

    3df13426752fdffd2984b3c7621f7a6a341814f2703efdf69abe6005deaf46b03846757d0c952c8ab4eb25d65a23823de4e57a0a6fa9e99f5977d9a8d5a429d9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Diameter

    Filesize

    64KB

    MD5

    db8adeb8cf730846c713bd1ebbc5468b

    SHA1

    a19deb191b8191ecb5397a7e5ab6b9fc64ebaf59

    SHA256

    2722dc623826dcc495878620dbeac31af477c4a0c85e4da388dff0bbfc50a398

    SHA512

    aa2aee71680cd7f60e632f029807aefee00d9040ca526ec1b782498dea357624ce9ee3592ddabcb2b9d84d615a59e2714fb9925eba62aaaf09f70468aaecf468

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Dp

    Filesize

    135KB

    MD5

    f73540508edfb615775ef84fa40cf5fe

    SHA1

    f3f2a99a6ce195807d810b607c9f881b1d38bff1

    SHA256

    c4bde51857d97490941720c77e448fe4a533e9ad5477ce633097de405a93871a

    SHA512

    b0821e1bb6ce98ac0e552c10f1510205668aa097c4f19a3acec9ddb96f52ff1650403fe9344d2b8fd8b5490bc75583f000f82c0d6e7b941ef3e06871f759df55

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Eagle

    Filesize

    100KB

    MD5

    df107f4311274be0a781f18eb60f1aa2

    SHA1

    193b1977cbcf008ed5c20a60067523264033535d

    SHA256

    b48c5a21a7490d2eabe2f0dd07aa4e00d42d2dc911f11f70a80e42b2eaf0bebe

    SHA512

    90fa33a151b8fcad35a7a6ddd179454f5c8a1da811ad44f976abfc90f3b937d60d47393e5a0acafb800c523a2bf849172be9863a824b4aeb08def719c4fcd095

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ecological

    Filesize

    133KB

    MD5

    d62c1dc3968ba216fb63f20c0c221f47

    SHA1

    db5bb334e0c0e67cae8fb76862f2b2ad2a8515d1

    SHA256

    62f1ca51f1f94f7b1c6c079cda2d5f7fb7b58a12d94dd995d5079d53e67f7de8

    SHA512

    266b0e0fe79e013a74fca51082f3e07e469ecf1cba76f7d9e961188bed53cbb0f26cc3f008f82e1dbbfc3eac8775074fa703659d2e72043aff3054ba97afeb34

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Freight

    Filesize

    21KB

    MD5

    6e691572aa2f1658617edeb575a9b54c

    SHA1

    0803fcff1b3315c245a854ce4b9e42b20edf9391

    SHA256

    44d6571eb71090fb8abd0b038995f25e12ab151ae6a4f6477702e92159f66c6c

    SHA512

    bea4e6026b14fcf5eb244d209d414327ef9a960d559b20d4b251f8f1aef9a715b18d99915452d045e409521df0da4b90866070a86ce27c3d2524c176c4d707e4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Handjob

    Filesize

    2KB

    MD5

    904cbeb6b6fcb6543095c4df33f700d7

    SHA1

    f9750ac88e2f000f954887e28810939f214e0be1

    SHA256

    4782248b9e73ff5b33aaa8ad0f850a22d0e9c56b738c77fc9c645d9f1e710f90

    SHA512

    e1eb18c126954a8ec7600076ade8f53481d40914d725441e1638ed33b41a991eeed56bcca087d788d778a7094789b0f068d6483c79bfe03eb8d9d6f9f6a37cee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Hitachi

    Filesize

    52KB

    MD5

    d27814d981f83abb6b9b1a833e00f528

    SHA1

    3f3976a93b941a0825bceaf4b4db942dea40a46c

    SHA256

    f2179d7b1e97b40af140a89cee496e9f3e9f34395c21440f144878209711ef9d

    SHA512

    094a7364f19b3c39284809ab50e22f7bac6751360db7367e520c87fb8fe52b858c142ce193732f6115363ae915552c54454cc735a571ef973d0e9ef524b92e17

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Initiatives

    Filesize

    101KB

    MD5

    fa8d004eeff2a39be874a1dfc0e13d29

    SHA1

    6e882516e6d58c7bf711762201835d1a482910bf

    SHA256

    138f1d0141bcda52ee29b28fab4727a584765e0fdac087f6e0b34987c8cf2a3e

    SHA512

    af6f43fa6b6e4f0feb43afc96ffcefedea1e654f7cd1c9464f5f70458ff5677adde79cdc5243a77fae306bbc41627109a3ac70d687076abaed7ab35bcc6291ce

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Moms

    Filesize

    99KB

    MD5

    ba53903918a4ba90871decbc9ccb81fb

    SHA1

    f53f16d50faa0893d6b6264a503994fbdda70395

    SHA256

    62384fb88103d842dfc2a726f969017b5bb6ee432206061dfdae8e7c191e170c

    SHA512

    04aa69b0c2a74626f6c5a55c2e6cc8a32ace993847c2e29452202f58c80a30610dadaa43d6ef8d26cffe3b0fabe70a5bdf3a5814ffefe9907c4cd62e19cbb410

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Paperbacks

    Filesize

    89KB

    MD5

    05e03d7da0e9b5576363e42af0b2c8ad

    SHA1

    8148210e57cdac4d976a62385310223ac857a0c6

    SHA256

    021f43d1e8254c3ec6a322211128f1fcf67c06dae0534e964d1f49995889fa9d

    SHA512

    730ac917ee01d02a8a554aef65dc497992d821c2edcd8fc772977378b06bf97019310bf984b472ab5f9a650dcdf400824db7f7a446ac7106a91f5f92af972790

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Pensions

    Filesize

    64KB

    MD5

    4fd5be9d8a4776fa1b403031f377b829

    SHA1

    0426cdf23571ea86d4073273a2ac08d453d110ab

    SHA256

    b32f0d076cc361c99f004afaeb85e71b84f8e9388e62c2a58bebe3f36d458715

    SHA512

    bbde199e26e3a6e71543b6e352442da4e3db839b8afcc462c5db52ba7999fdde7f90f7aa3f8c18120ef3035e1f681517127195b67d6a396058bdbe1d2ecec07a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Places

    Filesize

    478KB

    MD5

    a9b7ecd1288642968dfe06d66564fc47

    SHA1

    94987c82320538b66d7671b101cfb958063582cb

    SHA256

    35a69ea76294688bfd7cc390cd4d6dcab5b8071a4dd62c4d1134ae33453c2dc1

    SHA512

    99bfbf999b5d64920f0beac4df37d7a21820aca0a6c24693ac94ba5c62cd1dd8ea69d09f74d854cbc7ab698656c49221e454c22147d9d5bdbb9cde82f65ac733

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Salaries

    Filesize

    99KB

    MD5

    f8938ff73f893b3974f1d7a955c8d30f

    SHA1

    961921ce9f2d9f96b5a897aeffcf62ed0f69b5f3

    SHA256

    3531630f6cf59afdbe5c853856262923f67d662f509ce825a7839a0f5d97068c

    SHA512

    5cec2cc85be9ddc11a292b3ecf67030199c0c15f6461fe03b7132fe4ae7cd2f66f614e33eb5cdec83a80e95bf5eb5614a91ca1520b0b6cc6ae39185684bb2d5e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Selecting

    Filesize

    65KB

    MD5

    88996e59c981d93fb8667a1d81b978e9

    SHA1

    42c97a80c23f33fba5cd080dfffd62139d566c3e

    SHA256

    a11a61bbe4f0a98e4d399541454e0eef4a77a410c47d93495e37d7b83d50a106

    SHA512

    6b4a4ca38d5f25abf9a2ec415070cbe33c7ff69c3da2552668f2e70d0b7c90aa53450369aa64a07de0da2d68260cf78e6423a70da86eb65f9395ca106e0ec4ca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Stanford

    Filesize

    39KB

    MD5

    65d506131b160e8bde049b6fd670c80a

    SHA1

    7dd6f5d88e647a950a75d9897298c93fb1a6b03a

    SHA256

    4297d72fcb8697e56af0b4b48fe2c0d4d2f5dfe843a293a592f16847323d2e2b

    SHA512

    f22b1c454b93a112c995c3f8cd109973210a452fad4d08ec0f46724d99f1ac1a52fcbc596afe250bf84dd13b4b9845a3f7621d31c6fa8272cb3420181eb6c5f8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Tubes

    Filesize

    12KB

    MD5

    cc1e731d16fbd7f0df25986a7815f9fa

    SHA1

    d3f4ac24f82f5414697845dbc3f4910673dcb004

    SHA256

    a320e62855ef736849be24c9b24913f66c0f2b928281bddcae80b770b5fa491a

    SHA512

    4d9e94d23d07deb64384f32566b043ffefe94019896c6160ce20513b58264f3284f228ce3e0d36732b737ac8010ef233f8c52f48dd07eeed75377110918e08f4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Witness

    Filesize

    130KB

    MD5

    206be5267096dc0ef7aa912ae8ca1193

    SHA1

    3770d9ebc8b5eddde1b8ccc9bd91fb39bb9d29e5

    SHA256

    b6ea8e1f6b0bbe14bace4fe41d6814ac02c2cfca767472e913a859c9592be782

    SHA512

    701976cdf959696a6d20a1d1cf27106bf5713186e368849a7decd3f04d7d644393ae5dab9f6914dfd301c2314dc640fbb2a244c2a9d91de1c53077bc4d532738

  • memory/452-68-0x0000000000130000-0x000000000018B000-memory.dmp

    Filesize

    364KB

  • memory/452-69-0x0000000000130000-0x000000000018B000-memory.dmp

    Filesize

    364KB

  • memory/452-71-0x0000000000130000-0x000000000018B000-memory.dmp

    Filesize

    364KB

  • memory/452-72-0x0000000000130000-0x000000000018B000-memory.dmp

    Filesize

    364KB

  • memory/452-70-0x0000000000130000-0x000000000018B000-memory.dmp

    Filesize

    364KB