Analysis

  • max time kernel
    40s
  • max time network
    45s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    09/01/2025, 17:44

General

  • Target

    refx_nexus_4.5.17.exe

  • Size

    793.2MB

  • MD5

    421a48bd40a5f106ad5deb45ce5544df

  • SHA1

    e10329037ea520b2935070abe9ed25d3b2c1d7a9

  • SHA256

    027ffc79501cbef364b66eb1ed4cc0db213eb7aa2bc4bf30c8d2b52815c36ee9

  • SHA512

    c3a5b0ba4640eda54f25e9419b6c2811790ee4ab20f45af02f599a5453613cf49098175e3ccbf8142edbed93644f6bcc49816d53e7cfadbf762e678a9c06b975

  • SSDEEP

    393216:WfdIAmhCcTzIFvdK+ew0E8j75IYGWxTZae5qndVmzuhyxE+RuHXM0H:cNcvIBdgj5nnQ8y

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

https://breathauthorit.cyou/api

Extracted

Family

lumma

C2

https://breathauthorit.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\refx_nexus_4.5.17.exe
    "C:\Users\Admin\AppData\Local\Temp\refx_nexus_4.5.17.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Airfare Airfare.cmd & Airfare.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:688
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2804
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2632
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2532
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 412641
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4128
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Game
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1692
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Ieee" Care
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1328
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 412641\Transparency.com + Sandwich + Debug + Yr + Lincoln + Logos + Forth + Whole + Az + Contributor 412641\Transparency.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2720
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Introductory + ..\Hall + ..\Provide + ..\Row + ..\Adidas + ..\Electronic + ..\Midwest D
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2856
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\412641\Transparency.com
        Transparency.com D
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4116
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\412641\D

    Filesize

    481KB

    MD5

    0c3edf35ac4b16c96c96263f5690c4ca

    SHA1

    b4bfd35f66703ded75b909108b37151baacd5315

    SHA256

    0d8a755776bfe01badb823cfee4170e666c929cc6b61ea01a913064e3c30256a

    SHA512

    2e66b11b735510d4cbfe8ebe8e4129168eadf765263c17e915a1d4067ad275b400732d092619b3e1b3145c64fa2150b9724f54b38ec579803b77ff091a60dd4c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\412641\Transparency.com

    Filesize

    1KB

    MD5

    8a2ff2169a07f088928804af5655a116

    SHA1

    b77f2e636bdeb76e1d349a589f19bcfde854ef3d

    SHA256

    d4a8640893eb00e6c868db4194f434f74bf3390e202aa77d788d9b2c1a27808c

    SHA512

    a48e876bcae05c4ebc0d30715a0d2303647871bde5a1e43bc0bf38b5982aad0ca01eb6fdf2ca13a8d45f2e75a277771f1c7d50c30b2af23dcaaf660c8dc548e6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\412641\Transparency.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Adidas

    Filesize

    50KB

    MD5

    8890ad30217b5eac28a806c9f6646826

    SHA1

    afd0283e69996ffbe1a0032012706fa2f75001e7

    SHA256

    054fa236b21affc36c8fd8d5334816e1cb40b7979671af696c9948d90945ea9f

    SHA512

    13e19ee19f385fb0d50d498cd034cdd9bd4c379cc001f470c5e1bb95b8061516717fb6f3503ce6b3cde45bc937f3ae1387dd0810f2b57204250601dac727d76a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Airfare

    Filesize

    18KB

    MD5

    25d9238d8454b26e9a9cb229c98bb520

    SHA1

    5417100dfd897da358d0bb9c013a834a7e059107

    SHA256

    894a2fc5415442dcb534ff571f78831188d29e44668f432f21e1660ef12ec251

    SHA512

    937ceb26875b6554c255ada796b80c12ac577289f6c34e1dcc5743308d5028b3fa63913d16e90651594b9771a3d6d01ed077d5f673c9ce67df9825209339ebd0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Az

    Filesize

    146KB

    MD5

    f9186f6da3e4c3b6a8f644ef35c13475

    SHA1

    0f103554610d4b06a2298e788d1ea2e210304265

    SHA256

    bfe6f657bb5f67d1b94ebe0c00c27f06fc22d84274f5fc3f346d6b589be1acba

    SHA512

    8d75ad6e311faf72ebe2e2a540a2c448efb076a97500f9bdd2ce99d1ead503dc394478cfe8a82190e9c8d622a0d4ec24ac79b0afaefd256c5893fdfed033fba7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Care

    Filesize

    1KB

    MD5

    44eb9df3267c5181eaa90b2288157501

    SHA1

    1bd9acfef72eeb5dd2839539b679de235b2fd19c

    SHA256

    688a20527200703b8bd423c6d5d472132a0b121841f510e3b5975ef4305a482e

    SHA512

    50872ed9f26bf10a83f2bb72821d0cfd4881a0101fb5beaf011dacf5c54b22409d7e9c89549fbec89e7accd1623eade2dfa6fc1909b7dad238553e5c30c75ae5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Contributor

    Filesize

    41KB

    MD5

    6208d841411b7ff00e91ed79cb19613c

    SHA1

    59a09fdca4c21f1f47522c2e1dc292ecca6222c4

    SHA256

    c40977c34c4307a530a61d712a57405d8e9e303c54310a4cb51b66c9fa88327a

    SHA512

    01b6657ff7b5fd6180d167ad16dd55deb706f2c0bd04d1a55d7cf6058cb907639ad64d69535d74f8af2a122bc9c2bc1f3fffe08424d243d6c91ac084d7629d20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Debug

    Filesize

    108KB

    MD5

    4cfa622df8e07dd1ab9eba5c66b12dcc

    SHA1

    06fd48637aa167d04cee86e58ee035732b201f16

    SHA256

    7d74344414fdeb7be797fb12144a390245130a505100607dd924e6473ade6318

    SHA512

    f2ff34b55d684663dc4350953d2486c89eea85d78163a6adf4e91b9a6054ae7b05a6c7abbbfe42ee465595870ab99f71e419b84d4f01394a3f7660df13b7fba6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Electronic

    Filesize

    89KB

    MD5

    82952dacc84d83a87ded1197f0141b79

    SHA1

    a3c5731314ffb65e7e4235d38b3178764f9b66f6

    SHA256

    dc396d66af1711dbb966cb79f74f4beeefa83ef9c43736b0019ea6384383ddc7

    SHA512

    22a307e3b61eb997e5e2e91779cc972a0e4e4bfe031da6176a8dd7a4eef3373d3e2c2e5da645e8158bc0526d8d1896c77d63553916b812601b2480e075d60f87

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Forth

    Filesize

    107KB

    MD5

    05b03a2332d090e42ed3b18c304383c8

    SHA1

    c3afb8301895445ee942ff221d612b98328d837d

    SHA256

    c394b91818796e889470a2abe97a51462bad6ae515a73d789237b465ac1fa52c

    SHA512

    00a732e56693ea3952f94c3439570ee2250bc1ac0e47e6f550ab53a5a68cc51f419662ed6e2fd2f6723638f0a56b571d1f90fa40da68630860b93de75f345df8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Game

    Filesize

    477KB

    MD5

    0b4236ee1e6350c30fbc43b4df21714a

    SHA1

    a47d0148c539f8f02e3cb243e726d4074868923e

    SHA256

    e6f9e5da28273b3febc71b10fac7856d16a29ecd43b200e54130fad034bd06bb

    SHA512

    ed3eb9b88333cc0284cc33730103a8859078e25492d7d4a94e38bf3440b7eca2e0ad3defeb38b2e3a3ac2922df97486e102415883bb9b0d2f3c2735805c3a909

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Hall

    Filesize

    59KB

    MD5

    55adfbea53950d4c53d8be4554f1fa72

    SHA1

    61a4fd8ac6637a9ff2956ed86c0db9200af42fcb

    SHA256

    3bea64f987a506e9b1a8ef9d7a817a6a9dafec35e3872226bc6e534b54e06fb1

    SHA512

    79dac2f5d0f2296029f67c282b51bb87b16c22947b425793e20d77c39c4907c8c16395edac9608441af9c55c6eb20935c31a430b889826c9b947b887efa67d8c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Introductory

    Filesize

    58KB

    MD5

    45cad5710cf32a1b405656194cb286a1

    SHA1

    7fbb73ce6f09b1b47b08b882b57cafb06761e4e9

    SHA256

    eaeb62c9055c367a954a454ce6e65d9f995720e8a057bb801a6698afa6aa1470

    SHA512

    a5d3d3bc82f56cdc4afbc19a2efd4347fd07421e86f7d97e00a5424126be8f5bd1655cdaa8def2472ef1449793810d9050d60b3870f712f0f34f39347421639a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Lincoln

    Filesize

    118KB

    MD5

    13c3c8e5d05f6fbefe9ed8f22e8b617d

    SHA1

    7a3a0cf920747661e6dde7c783d9eacf8440ae3f

    SHA256

    e7969ae321cb61b7cbb8fc3ce002fe884f3d6b2deeaf0cce19eb0adb13624dd1

    SHA512

    08ddd0c83d884f2c6a337054ff0c3230f9bd0432eaeb7b553877b27276c2645f3bf9d9aab887ada989241f5c3ec8fa9633ce5b5c808b823833ddd9edc95da054

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Logos

    Filesize

    125KB

    MD5

    bc6ab270f03dfbd5329aea95f451d3b0

    SHA1

    8a13c5e7bfc51e763da990243eb8e56dd9609d00

    SHA256

    8e605cf4ffa066438b355076af8230e84da4c9c3dff33d35b0b02b932e80ca7e

    SHA512

    632078cd4969b52ace062c79421f1d1e5383a35477bd5c322a1319823f117e204b2ede88874400e5d11ccea0be5dea46a233700d19a05683fb492730c71e588b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Midwest

    Filesize

    40KB

    MD5

    d2a8164fb8c5f663a2272f8d75232fcb

    SHA1

    95ff11101bea0a60d067b483c3323567cc613d1b

    SHA256

    6309998f0a4911ee4ca067eb9feb974e5de7c95db6524e66086c7c1b57265bb5

    SHA512

    f631bd964f09db2734bd207750a3a57804e57d30a68560d02f66ad5c3e4c6ce9fa7403b297b1caf6140390dec9f14e8c50c59e4e3ed9a2a3016f67bbb0bcaa45

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Provide

    Filesize

    91KB

    MD5

    3f8be08648f90fbcbcb0ffd959e5ecd4

    SHA1

    641c894a38113ccb575a297d248d5945781900d4

    SHA256

    cf70a05214afa5f50f9475c6686b9801f720720563c15728fcb20b95571694ae

    SHA512

    5ef3a8f497082dc1cdfc120f9351d55a4ade9c8422e26575440ffed2266f9978ec1d9b6149727a493b2f31da82aa1d22b15ab8744026124e06bc67514b26c1a0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Row

    Filesize

    94KB

    MD5

    8539f0ba658079fc94e2bde2d53549c9

    SHA1

    84a7d8945f4a00822ae2b38c05f79a264838b68e

    SHA256

    0cedc573b3f5c67842872f2dc2650ce4c45111be26d17902be26a8050e7814fd

    SHA512

    ee566d3e4c7ca3fd22fb74cf02d26d4857da87e2d242e0d9e896b1fe56fa348d5757a7d642266d46af4893fb23c8a4a4a0786cb621e5b46543c8bdadce0905f6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Sandwich

    Filesize

    125KB

    MD5

    dca7d73b3e0ecc2bc23c202f575d0807

    SHA1

    d6bf2826679455a687c0c859fe8148626a574f3c

    SHA256

    6ef6ac9a1919cd0482fc4a6884267e50fe6ff13198afc0f8e5090d7bc9fb513b

    SHA512

    ce40e672f08b48372fa109b64510e28107760b41ccb26a728e52e9a377d52537160b53758f6ad87db3d75c5265ebba41f029a2d47652239de784b64ee1e7a38b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Whole

    Filesize

    60KB

    MD5

    e6b82e5ba90de9145a46f8a9d4588339

    SHA1

    0792b08d247f81854997627792e9f916b1fb1e8a

    SHA256

    7486b6a13efeade618dc9f160784605048e06c38480059af6a70bc8f74cc0555

    SHA512

    339449e2fcbfcb31e90c2a12166f8c1b20bd5063b6ae4ae5c6f1080f581a713c729a8b08bbf9b346049e4eebca2812998fcdf7772cb6e4725e6427a2fa14aeb5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Yr

    Filesize

    93KB

    MD5

    ceddee6b1275349218f7a7ab2688d537

    SHA1

    6ca0e912cc7c01cd5c258f51301424afb27a30f0

    SHA256

    8c2976a3714d7f475145bcbd10f407bfd7fa23107d9bd522bca71271e50fc10c

    SHA512

    2d442944361548399fe386eea4355759d44ea4df73e321ed47e3a4ba0c93bdad1c33f08caf130d4645a84385dfc745b74659626ebceac6f82200bc8cd4bae511

  • memory/4116-66-0x0000000004B80000-0x0000000004BD8000-memory.dmp

    Filesize

    352KB

  • memory/4116-67-0x0000000004B80000-0x0000000004BD8000-memory.dmp

    Filesize

    352KB

  • memory/4116-68-0x0000000004B80000-0x0000000004BD8000-memory.dmp

    Filesize

    352KB

  • memory/4116-70-0x0000000004B80000-0x0000000004BD8000-memory.dmp

    Filesize

    352KB

  • memory/4116-69-0x0000000004B80000-0x0000000004BD8000-memory.dmp

    Filesize

    352KB