Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 02:10

General

  • Target

    6d7f1b46227593ce58ce2eac041a23e90f9fa45b2d609f17b1ac0cef8959ed0b.exe

  • Size

    1.1MB

  • MD5

    5421ec33225b0ffbc3e15ff647b52064

  • SHA1

    47bd52bc61b7ca0870774e5e57ed044a08c73fc3

  • SHA256

    6d7f1b46227593ce58ce2eac041a23e90f9fa45b2d609f17b1ac0cef8959ed0b

  • SHA512

    c0e1b5df77455e3afb3a0bcc029e81f551e99b832f816cb362bc9e0b0a1fa54dd6e09e7b201b2276a1d732784f2b00a41db264ba365fbfa88b8087da64547b9b

  • SSDEEP

    24576:+ifOu5Zt+AnkGPKv+bN8fspSkVfIhohNkokVQAb/20Ux6LNgZNmb7Tb7j:H2uRkGPKv+Jfe6rjWT0UgzU

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d7f1b46227593ce58ce2eac041a23e90f9fa45b2d609f17b1ac0cef8959ed0b.exe
    "C:\Users\Admin\AppData\Local\Temp\6d7f1b46227593ce58ce2eac041a23e90f9fa45b2d609f17b1ac0cef8959ed0b.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Educators Educators.cmd & Educators.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2888
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2224
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2796
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2940
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 250986
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2228
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E They
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2828
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Community" Doom
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2492
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 250986\Pulse.com + Forget + Sea + Cakes + Against + Touring + Country + Greenhouse + Tape + Iowa 250986\Pulse.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1732
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Disco + ..\Provisions + ..\Databases + ..\Fact + ..\Installed + ..\Agency + ..\English M
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2040
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\250986\Pulse.com
        Pulse.com M
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2540
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\250986\M

    Filesize

    483KB

    MD5

    947293c6a6d79d08b7557b714cebedd4

    SHA1

    1102ed48f702feec6e2f674a7355d78779884d83

    SHA256

    bb4e78e7217fd6b7d281cf9bd074d9f89f24cb6b88e4a3ae62dea8a3ff2fa092

    SHA512

    fdaf9787c012a998d4f7a90218c1fe7071010c255cf276f73ec309003ce6faaae72f9558ff88dfecb7e689331fe07ecdc4f741dca27a124e7d4aafdf4079e008

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\250986\Pulse.com

    Filesize

    2KB

    MD5

    05438ce0a5d4263732ffb7e5e9436826

    SHA1

    36bb5879fc36c85d53d8ae34fca4c232eb793766

    SHA256

    cc7426bcdc08c907f4e02a1e90961a3f8a074643491df2197856af90ab8f4d8d

    SHA512

    4a5fbc56eea46ae894354201db598efeb0a6dd04245c5f68603254aec31210a44dd8b2d1e36845f87c6fd8e219744a491bb4a808574f2dca2938f58bc0a63def

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Against

    Filesize

    113KB

    MD5

    86fa138fe7405b4b5b941655b60907f4

    SHA1

    7f57b1e7977c4eb280feac2604580b4e43c7b42b

    SHA256

    e4621731d1615588b27ad6b3567d4a1ba1e4dddb662d23dae1c6ba64d823daca

    SHA512

    4ba7e23c7b3dc7caab64c4fd7252dd1b89761f2126f15ae18391bce3ff96bd482f5f1a1ed78c3000cc00b6dacaa9ccf8c613eac7a86cabe1639139b2d6183138

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Agency

    Filesize

    55KB

    MD5

    a1851fd5f3f644f60a785627cd8f433a

    SHA1

    0055cfced05547414790d889793cf32b9f2b7ce1

    SHA256

    a1304aeedfcc128c64e13370b50e3a846b30384ac275d486d82e8ee6c55a5d53

    SHA512

    639f049c45ce2e82e2cdb2d5e45a4af6df1f97116629eece70e9e7b93fa72f2b86d6accee40e60ac595543211406b50c7bfc2ef24f82ff82d9608596c2295995

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cakes

    Filesize

    123KB

    MD5

    176be8d89e0f88d75818b508ddae604e

    SHA1

    8cba426e1d1ef3104cfadcddd4af91023e5dfb37

    SHA256

    42ac36f804a578fc0d14d47bf57251cec7dd287c689efe9551afc85fe7872225

    SHA512

    fe6497bd4aa0477a983e2b35e673c9cb144b9d4471a1d3ee080e5658f26901e3bcc3d931539c68945660d98541e1fe641b65a9cf70c946037cb5b4ca54d40d1c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Country

    Filesize

    55KB

    MD5

    bf97aa1a8413c496ee5302b99c8e9ef8

    SHA1

    e21f3215fa1c6209f942606692567df9aaf61922

    SHA256

    aa3d62187704c5771ee4e1a74cdd2aacece2edc26d2975e71ae6fe2827af633b

    SHA512

    2a20070de3f99bc27581d3695fd13af4531b2bb4d759b9ce019ba615f8d026ba8c2812f5bf4d636d6e4b8ba5f60ea8b84f5017fd8202bc808de4a5f2655e2843

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Databases

    Filesize

    57KB

    MD5

    d66a327fb31fd8adc7181e7bedb06a45

    SHA1

    6ebeb43568f8bda4656adaac1924f66e1229cb81

    SHA256

    28443048cd31f071350d67d67d0baa4588a762342b1ac1b022aa62a6fd75b1a1

    SHA512

    4b17b8fe3fcf245c33984fe97f7810302dd78c6a6c006bcc81e9b7cb313f8fbf455afbcdc8f532629f839913eb8e710de792adf27e5c9e3cee86b3e442019145

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Disco

    Filesize

    87KB

    MD5

    df6def27c2b1d6f0aacc5522f6f7a201

    SHA1

    e330f13b2ff6f266ec2f10b27a65a7199fe5f6a3

    SHA256

    3a728fe590eb6ff70cf3425c8a85f4400141a7590fe081ffccf29dd419f347cc

    SHA512

    d58ca6b4634ea750c47c67c0d39433772db05eef1d2cd3ed921d04ec07f201afac81abfb63f738f25ee34c768d05e23ee013e4464a9caea80cfbcd71c4de80b2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Doom

    Filesize

    2KB

    MD5

    8ab32663d80201e94fd55d3db63cfb13

    SHA1

    3293b038f1e25fcc0a15143671fafbb97e4b9ccb

    SHA256

    5494a1ecad0b0d528c929b2ff3f778d4c6bcf5d2163ade3562853508565518c2

    SHA512

    1f409ab14069acd71012bffa4755650dcc53571dcc4b7090d471562249c5f4e1e4353922376eb94ca08a5367faaacc36d3026e287870b185783d045d246a3bbc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Educators

    Filesize

    29KB

    MD5

    4acf0c839bcda0d2ca587215e7deb72d

    SHA1

    549badf03c9e6a5d9605269e14e2eb875b8fa2cb

    SHA256

    081fd3047b378dddd9f621c63a9366604b75e862a150084fbc64e71c833a4ba3

    SHA512

    3a93ef2499c08cbcd53aeb06d7f3b8a92ec412f181548f841aa9ff480a476087486e2a8249c951f113df1a9cf6bcf259b1b8e9dad66e820dfbe6bd52cd5925f2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\English

    Filesize

    35KB

    MD5

    82f1c2c555846798e32fc1c767a929df

    SHA1

    e4f7e8bb736ee2d3f3b5d3fc635fbffc12eb5966

    SHA256

    4810275e9baf0bf57c466e259710219476fced4e087cc818a1f82b21ec938381

    SHA512

    8875d76b698011264468b816058e39a8243e7f2676463dd098ce47aca585b63dd94a0a7141c76bafd5bfd901584b643259746b1a1679a481d3cd8be432088563

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Fact

    Filesize

    67KB

    MD5

    a690a482998d891f74168ccac8461056

    SHA1

    96dc8309e88766d89d34cdbf18ad931d27e861e6

    SHA256

    1dcfff07ca838665694da09714d5ff1368a419aef2adb5d83a1feafd55c6ca99

    SHA512

    18095614d439d08e796b5622375edc2a527346142b1448fcee76d5a2bd452eba7a79b21e85c8d88e21eb380daaf09a1caece23da52c6eadc8ccf333131d18cec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Forget

    Filesize

    145KB

    MD5

    acc9cb018a73e25ba994a6b4ac24a501

    SHA1

    941ddc6b9daafcbf6906c77b5db6420b65ada467

    SHA256

    fe767c39c889bebfc557baa1b3e7f10f4698d3efce8b25b5b50f4c18ff76bc84

    SHA512

    13c046258fb5b187fb996fb5f66b9e4427fb068c3bd83fe0b17dea6822d148bff06e55e106d3007ee3baedd0cc8376cabf9fa3f03d9c9969f4859f82513f3dca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Greenhouse

    Filesize

    132KB

    MD5

    252a24a7b63ae37260023ca212396cf3

    SHA1

    9a0137049a35f084530440ea4d3553a8038a49d4

    SHA256

    ac5793433f952add4e018e69bd63648f812a7b5f6937f683381c47ce3bf33e9e

    SHA512

    5a5f27c41849c83c2539c48c77593a49e734e597039484a509a380b4ed55f04200dff2cbfafade650e10e59cabf863636e44e8aadd7223160cfc73463eb3a2ca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Installed

    Filesize

    87KB

    MD5

    eb654920603249f1642856cfe74668eb

    SHA1

    f2c141904d91362e9fcc0c4eee6ac1397ea95be5

    SHA256

    c0de222efce0bb1f11e38519ecc39f552351e1470a7f855f3a90b0d40a734af2

    SHA512

    e03facd406ef80bd2f9b3cefaa693bc27fa83c8971484cf25e670207efea988d48b6bf8ff755f75e7cfe51186ae4da916c13bc9cd654f7e05556fd413f2ffab2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Iowa

    Filesize

    20KB

    MD5

    cbd3141bba227bd1812061c6cff5ad46

    SHA1

    9594e88ff2086e1ac55089297cff12c0c18da91b

    SHA256

    c083c6a0c116a2da62f0e5985c8cc3e9eda67b20f6928decaed8185e2e58e9d8

    SHA512

    9e83fd130c1a3f2f8a7ef2553000cb873efd8dcaf8735c117f186af5a29d6ab3481e38037c3163ba634130ae41e7804d3fae891b48cefcdc66f0d4965a8102b3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Provisions

    Filesize

    95KB

    MD5

    56bc76e375a6ab1c710d8efcaf42e65b

    SHA1

    73b8f8106ffdb191bcd83957016e4413aea9ecf8

    SHA256

    bc88a74c68c5a37d92a0870b3a5967bf01b211e6fc3f44c2d6b20cf597054f4e

    SHA512

    33a93a75759d4d5270baa9e3fe091dd70a2ecfb261fa5aa912bd823a84335ca910141049de1ab73415c4d13e60c06d81a4acb81010a57363377db49394eed102

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sea

    Filesize

    148KB

    MD5

    e9c1bfaacd388ee7ca413099cf9322a5

    SHA1

    57bfccc281f405eda1633e17d2b84d6f4dba9202

    SHA256

    7f810fd5d0b579645adff10a429bbc01cf1c5ff7350e3fa01ce3536cc6f66105

    SHA512

    2965795cbd7c56590248bac9bc4692ec971de5d856db140722fe7c56e47727ed0cbb42c8099edc1924906db591a83f6288af309763450557a09cc5caf0f90090

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Tape

    Filesize

    83KB

    MD5

    d116079016a62adc12c490efb496a50c

    SHA1

    f1bd72385afe61781f2243c3220be8446c4c4bc3

    SHA256

    acfde4e325af5238134876908519fa81f9b93da3fc8d4d0391978b00ca157496

    SHA512

    f9ac61d803ae3548ea50573beda7eb4f550c32e04614bb39644f3ce5193b106b655ba06dbb503c7cd09adbd887b261716d1c7964b7d4dd6c173a86df6d1a3db7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\They

    Filesize

    478KB

    MD5

    dedf871bc1e9ea619b0f5cc6f3fd082b

    SHA1

    2ba6c36e02a04a90f25108359ce0dba7ecf2cff9

    SHA256

    573dd4e08499d810341968687d01193a98621f7e6e81d9693b95eb597453c4aa

    SHA512

    946554a68aca8f372595b863b9b08f7339d84f6c4852b3fc6d8560681f20343be2b1c00330eceb4a3e6edffe4accf895b044d984a115c6cb58980f686e443591

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Touring

    Filesize

    103KB

    MD5

    52bfe0235ea9fb7c2e74817b3778688b

    SHA1

    b9fda0c4bd23dc1f46dabd34e0350b208cde111d

    SHA256

    c0f58892bac9373417935337635a84f0a5c8625287ec498cbaa8b30301710b7e

    SHA512

    505db5a3031e00cc1f879c84e037e3de93e7702b6e19242235924613d7162d2a924635c6e3c72afd479337492e29ca4df78db783de6e7352f381dcb3f5ed8e6a

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\250986\Pulse.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2540-67-0x0000000003680000-0x00000000036DB000-memory.dmp

    Filesize

    364KB

  • memory/2540-68-0x0000000003680000-0x00000000036DB000-memory.dmp

    Filesize

    364KB

  • memory/2540-69-0x0000000003680000-0x00000000036DB000-memory.dmp

    Filesize

    364KB

  • memory/2540-70-0x0000000003680000-0x00000000036DB000-memory.dmp

    Filesize

    364KB

  • memory/2540-71-0x0000000003680000-0x00000000036DB000-memory.dmp

    Filesize

    364KB