Resubmissions

10-01-2025 02:36

250110-c3z3hsyqcv 10

10-01-2025 02:22

250110-ctwzhaymhs 10

Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 02:36

General

  • Target

    0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe

  • Size

    1.3MB

  • MD5

    a0f063b82ce5a44aba075f17b9284bab

  • SHA1

    e1c46fb92ff3827347c47362511ccb0b1b09f123

  • SHA256

    0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118

  • SHA512

    53c13f552eba709d7a558b34c2c1ecfd35b42391b33fb882a4cb3fb3c667e4d1c4e269e7d8b3d0688bd750912307cec1612bde9c0c967615ac34f4d015ce5d29

  • SSDEEP

    24576:QxrfEXAiIKn+pSBDXQtHjoD4eS8QfuBeeTAi/ZIwoMmoz8qj7UnaBK9PIU/gsjTO:a8QGBeqvBbLQqqIiVTvsBV

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

https://charminammoc.cyou/api

Extracted

Family

lumma

C2

https://charminammoc.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe
        "C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3164
      • C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe
        "C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3164-0-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

      Filesize

      4KB

    • memory/3164-1-0x0000000000F40000-0x000000000109C000-memory.dmp

      Filesize

      1.4MB

    • memory/3164-2-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3164-3-0x0000000005A40000-0x0000000005B72000-memory.dmp

      Filesize

      1.2MB

    • memory/3164-4-0x0000000005C70000-0x0000000005D98000-memory.dmp

      Filesize

      1.2MB

    • memory/3164-5-0x0000000005E10000-0x0000000005F3A000-memory.dmp

      Filesize

      1.2MB

    • memory/3164-13-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-6-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-27-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-59-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-69-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-67-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-65-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-63-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-61-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-57-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-55-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-53-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-51-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-49-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-47-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-45-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-43-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-41-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-39-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-37-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-33-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-31-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-29-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-25-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-23-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-21-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-19-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-17-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-15-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-11-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-9-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-7-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-35-0x0000000005E10000-0x0000000005F33000-memory.dmp

      Filesize

      1.1MB

    • memory/3164-1328-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3164-1329-0x0000000005FB0000-0x0000000006034000-memory.dmp

      Filesize

      528KB

    • memory/3164-1330-0x0000000006090000-0x0000000006110000-memory.dmp

      Filesize

      512KB

    • memory/3164-1331-0x0000000006110000-0x000000000615C000-memory.dmp

      Filesize

      304KB

    • memory/3164-1332-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3164-1333-0x0000000006A30000-0x0000000006FD4000-memory.dmp

      Filesize

      5.6MB

    • memory/3164-1334-0x00000000063F0000-0x0000000006444000-memory.dmp

      Filesize

      336KB

    • memory/3164-1339-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3164-1343-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3164-1344-0x0000000074A00000-0x00000000751B0000-memory.dmp

      Filesize

      7.7MB

    • memory/3680-1345-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB