Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 21:51

General

  • Target

    Setup.exe

  • Size

    1.1MB

  • MD5

    85a94e425d3175ef500be48d4c9d3603

  • SHA1

    b6ffa5150169b46a5f7dee493cca1575bb16c881

  • SHA256

    37e0cbc1d55da58b1dcb1665c0c38f87c532cf7c3743216a39ef8158781f75b4

  • SHA512

    b62056f169cd0777dfcf08fc16c03014472a32039bc3973a46dcfd9e43fe4277e62cf9648137171b39425f9f67ed5f2c346f9aa4e50cfaec815e14b0c37bd2e5

  • SSDEEP

    24576:DuPkVqms2Z3TsZ6R1P0qKvxxAeqKIOgZDmwdwng:S2NsuQ6DPkxx6QGmwCg

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://enthuasticsa.cyou/api

https://fraggielek.biz/api

https://grandiouseziu.biz/api

https://littlenotii.biz/api

https://marketlumpe.biz/api

https://nuttyshopr.biz/api

https://punishzement.biz/api

https://spookycappy.biz/api

https://truculengisau.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Shoppercom Shoppercom.cmd & Shoppercom.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2540
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2504
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2748
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 598591
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2824
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Advertise
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2840
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Findarticles" Stockings
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1312
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 598591\Preceding.com + Expiration + Rights + Addiction + Intensity + Surfing + Jam + Dramatically + Human + Enlarge 598591\Preceding.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2848
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Cd + ..\Invite + ..\Reproduce + ..\Greensboro + ..\Nervous + ..\Few + ..\Since o
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2336
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\598591\Preceding.com
        Preceding.com o
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2772
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\598591\Preceding.com

    Filesize

    1KB

    MD5

    166638788388951cc756b0b69f4a855d

    SHA1

    70bcbe64e6be264d2197dbd581281e7f8ecc69ba

    SHA256

    813c132631770e51b4f73fdbfe9496d74980e69a27218a16f05496c89fa3a6f6

    SHA512

    4464111d8a900ad219cde05ef8d02b6872f91d42466520dd4bc6d06ceff233505881272412a55534f3efe205e92e084c07c02a7f814e6e574ed661aae702a884

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\598591\Preceding.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\598591\o

    Filesize

    478KB

    MD5

    4943dad399d99abca6effc6eee7ab9ca

    SHA1

    7d020e039a722048e1fdc4bd4ca871211407c78a

    SHA256

    19ebe0e3c53208066368a237dc97e196f3bb27b28b5dbf16a54d76800fcea799

    SHA512

    ef8936ee1986055e1e102fbcfad2d9a70147a004ba616b9d47df9f375d55b31bcb3aebc0d28e3efadeeabd04de531274063b609342cfc0a70ab0233f5fd19278

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Addiction

    Filesize

    114KB

    MD5

    ec751ae0e0a69facbb07e0d163d61145

    SHA1

    85926f24934bd459d6cd49b7e4d0aed601e673d4

    SHA256

    ec4992431b1064c382cda3a063b124defdf703b72bbce70b57162776d5215bfb

    SHA512

    7e1f0f9df3b9ae48a13b0f8dbfa587cfd917a2c01747245f7b41654b91367dbf12162dc90a68b2e60e929572aefb69023844031d64aef7a95a6fad835c0e499f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Advertise

    Filesize

    476KB

    MD5

    26acc2c2b1a4a6983c41dfd34e7c0e36

    SHA1

    8a30d347ceb04855bc6b88e2a988c57e1c4f2bb0

    SHA256

    76cfd25838962190a5c14c92c53aae0afc6eb1122201632aa084635d59d0112b

    SHA512

    9c7f4af8b8ce40b0c1e41784758c38c8dd5334eba6b3ab900e44883814a569503db326ddf5bd40a46ff052c461dc8a07d4f06d50331b6730b6b162199aa44b4e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cd

    Filesize

    85KB

    MD5

    763bf55fc59201a4eff3086fa8052327

    SHA1

    4e8a529293581313b9d191e42576f0b25b296879

    SHA256

    64e44026acc84196281eef8973ac69f1ae5dd431b841cfff014659d040508261

    SHA512

    760adddb0082b666516c36610e331905116fea37684db175dd3868991b0cdc5bc1ee77802a6a01b6ebb5f74e42b3325d8f5eeb91191e74032c6c812aae212c59

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Dramatically

    Filesize

    128KB

    MD5

    218d7026de73b67610f14559abd04f51

    SHA1

    caa33bb71def185898e3eb024132bcd45afa5a82

    SHA256

    cb5be80e10f2845a913bffcd157f4e3996b3e2dcaff08df3da3a1e81e59e9e8a

    SHA512

    ba6a617f0ff49e008d1606154d29b1e13c892c8067a4c07865d671b595a0697a38618b6f034c20fc69a81256b2d98b944a228dc463dacabb232f6352f2083392

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Enlarge

    Filesize

    107KB

    MD5

    d031193d834fdbbb9332090b9c5dc760

    SHA1

    a897d8726bae077ed1f26b5c2356439814af5ef4

    SHA256

    23d9d85f41dd932ae769b71704199fcab8082dd919719ebc5d7dd94ad48bf3ea

    SHA512

    409edc92e74d470b40fce81df3c2b82e4664ebca5207e27e2b6e0d59250e980f7e64cb812bfd42de6b23d5c1de3c317e41315834aecb701b1d916d3714efdd78

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Expiration

    Filesize

    74KB

    MD5

    ebb80a826af017f0dbdbf29596bbee08

    SHA1

    15e7acdba19592fe9977a3e59e0cd3cd311aa58b

    SHA256

    7b7f0a1bb215eae100920ebaf001e0d732dfa0bc855686de659e6c295f6b098e

    SHA512

    814f9e210e8e88d652fb474c0bd5991499d3f64d80fe3d9d42bcdd9152fad478664b856ea1deb9e38c9ffb845abb7f7986e2be3c705adb89ca63dc6600af1682

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Few

    Filesize

    91KB

    MD5

    ed41abac6fca2d4a54d3151cac16fa82

    SHA1

    8660b9d0d6384b4ffafac08cd4e60568e2658504

    SHA256

    9fe3bfdf7e5ec9c9eb7778a3dc460b81e83257d7d3ddd999e7f2adb5e28f2129

    SHA512

    45d525a676bbdcb326538835c6987e06c1653c589f5ea8a43c85b6d4615ddce90ddbd20935ab211df4400eff7b3989fb384b03377b53000bc40e1dcd1ecc2139

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Greensboro

    Filesize

    88KB

    MD5

    f2b4332ef470ee68e2aa208b545211f3

    SHA1

    2160c1425c809fecfe8f9ca03bbe91ee7c9fb6c4

    SHA256

    268cad07ad728a6a69c89fd7d51051c858dec6e2777626d70a03b48dd36c9e71

    SHA512

    9fce7b43a1d7c9aa1290f1a7416213388001d14618b36f833f558cd5350fa80032bef4c53276100f6c12f3a4468053d2ba68660ffeb80923cd537062a8af3019

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Human

    Filesize

    59KB

    MD5

    83e89460fc3164ccbac0a10b69ff7460

    SHA1

    57d804bc53108597d856c14464a5e5d5bb5fc20e

    SHA256

    d792b11d5d5810db2115264456e925a9a73784fba070aae4f98de8129542d77b

    SHA512

    60ba2b3ad479fe1717e45684f7dec7a26c3fc32c911709c8ab00d9ea1c50fc7e5ccbb8c9254657354fe3a2538b6552731349d1360a39eba6042d5ee7ef439ade

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Intensity

    Filesize

    115KB

    MD5

    4fd1549a7efad77088b4211f622784ae

    SHA1

    767275cb282efd2bdaf710476b05533f81e8104b

    SHA256

    ed3253b2734e78df2665987cdf316f89288e7c7feffaf20ccc9e675c49b3aaf3

    SHA512

    dde528167dcd1f4b669031f304c9a9ea144947d8f2f49c8f8100f65ecbb23e23fd5098e6a96a9bfb51041174c571cbf71a807cf33dc09a8f2472201e14a095e7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Invite

    Filesize

    73KB

    MD5

    74cdff214030e19f3292201b91c9ffa4

    SHA1

    dc935bfd0e06b7c266dfd6e47685aa8cc07848c2

    SHA256

    99c158384ea4f7881c246b2bdbc77eacae3cb6fb9106d5acd0ff8c81f874cbd5

    SHA512

    abb20f8634d1434fa124cf3035cf624f35524aac216b3bf2cb00fc3ec027f0ea408ce6a842c3c9d857e6ecdd20a3caf9cd95032077895ba5a485fe7eeea66364

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Jam

    Filesize

    105KB

    MD5

    d7ff83f3c5ba22021b8845eccd4acb8a

    SHA1

    6f214b1f32bc42d655ea5c0cc77a5136cb75a78a

    SHA256

    2ab9cb438ff8550a01abf89029fa987ebf948bd385bd0e93e4cc41044aff1ccc

    SHA512

    d5198ca1b5f21e6df7516ad7c79306705a38b8683d15e41094df8ad4d9863b1def67930c594b657326f1e84d3e673498d66f3234cf0091a671a3311944fbed78

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nervous

    Filesize

    61KB

    MD5

    e5ac066620b49f8b3c369ab0126db760

    SHA1

    5c60f57b6a98d6864b121566dbcfa22b0ff9a7ee

    SHA256

    feebebdd29eaf7cf43bb23b8f1620614cf7015da6b994c6230ec1a9e9ed1e3e7

    SHA512

    fc67825b335af0001872532edae609502e3321801e02b0a309912bf6054c84d5fd220120a67c59b68a507dcdb7b30b350c5e9d8d43d8a817a728028b9cb3ad3e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Reproduce

    Filesize

    51KB

    MD5

    8c0fa6ca097656555e367c0dbb6fa34e

    SHA1

    f693d09872beb7c43bcb96fe1935fc12cdb603c2

    SHA256

    920b71b8a7dff00888a13b9db7da4d6fd2dc9aa3cf3128e26a660bcfbcefa3a1

    SHA512

    d7744d94fc24f31a9adc6be33a3db5dac5d25573b341c72bbca9a8b50b509c1825c0ebeacdd6ac166ad8499c57395746fc102674d6d6decac31074b0a363504c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Rights

    Filesize

    125KB

    MD5

    d3b786c8a7964373b9397ecf6ee31d02

    SHA1

    3e9a3c18dd844785b6022458aa4a0d5f4ce63258

    SHA256

    8c4f29f6f8ad409c5dc096cd82773acc45937e4abb086eccf38b8a8d586685aa

    SHA512

    d05001269bbe4199777de6a4c10c5e92f1c2d46d8365ac38657b8c32dd210532ba90f1a70f06c4be6e8088ef623030bd00d00783e1b56f810115fd1d8f1a9f60

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Shoppercom

    Filesize

    16KB

    MD5

    d73b6f41f80e6986864a6243eeb10b7c

    SHA1

    39f1bc5e9b35e979c6a329bddd4177729d75ed56

    SHA256

    65a0bac7738384bd2dd3fae715aa3e46c7ab37e85241d5fe9b848952ebf80ff6

    SHA512

    401b55c19815a7a1512ce1de3298212f173308475c8b6b54f40cacf7bd7f804090100b361ac59fe95a631ce45cbd940feb37c5c4833e4eafd7c28b29e06f3bd9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Since

    Filesize

    29KB

    MD5

    a76d4ac3d3c2118fbac25f04d7babbab

    SHA1

    523cfafb6ea284a818dbf3aefff0972e5fe5c27c

    SHA256

    d9a0c94913dfb103ca17a5a7ec4411f0b5d7c0120d0a2a9b737debe089edebd4

    SHA512

    624694ac5bf9fcc40b5b8b762197c9221087f77a1f8f469c81513057c5e468c69e95db1a43379db21c0df067fe01fd0e11411eae4ffe9167a5f2337e43eb3b94

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Stockings

    Filesize

    1KB

    MD5

    8706d63e83b1a0eeae2cc8f8cba26fbc

    SHA1

    a4e8b3abe0985fba300ff567fc641d3b1902a9e4

    SHA256

    158065997f7ab6d1c9fcccb4413e0f678c4e2bf0e46d464ad886eb4578d05917

    SHA512

    f07b154c75182ce4138a7232c2538d34ae46514126abaa67cfa3c16272287b977329205361b244b2197bb63b2150af924a3f54a3c5962ae72e155c7e052871f4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Surfing

    Filesize

    96KB

    MD5

    ecce831a6923c3ff5a1cbb64e87330ca

    SHA1

    6e893e2aec88cbf3f5263ae345654ab061b4a97a

    SHA256

    5e4c9387db85cc5dc6b63bf35ac8f7eb8de36a2295b30626c2f0366a4aff313b

    SHA512

    2544d7278bfec0b4c9ee88ef345d3ed6fc99d789c60a527d8a7aab14d44ee638a9888834adfcab3bfde1dc51c62521f26deaf8227ed0a37e01367a03ebfbe65b

  • C:\Users\Admin\AppData\Local\Temp\Cab512.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar534.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2772-68-0x0000000003610000-0x0000000003668000-memory.dmp

    Filesize

    352KB

  • memory/2772-67-0x0000000003610000-0x0000000003668000-memory.dmp

    Filesize

    352KB

  • memory/2772-71-0x0000000003610000-0x0000000003668000-memory.dmp

    Filesize

    352KB

  • memory/2772-70-0x0000000003610000-0x0000000003668000-memory.dmp

    Filesize

    352KB

  • memory/2772-69-0x0000000003610000-0x0000000003668000-memory.dmp

    Filesize

    352KB