Resubmissions

10-01-2025 02:36

250110-c3z3hsyqcv 10

10-01-2025 02:22

250110-ctwzhaymhs 10

Analysis

  • max time kernel
    93s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 02:22

General

  • Target

    0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe

  • Size

    1.3MB

  • MD5

    a0f063b82ce5a44aba075f17b9284bab

  • SHA1

    e1c46fb92ff3827347c47362511ccb0b1b09f123

  • SHA256

    0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118

  • SHA512

    53c13f552eba709d7a558b34c2c1ecfd35b42391b33fb882a4cb3fb3c667e4d1c4e269e7d8b3d0688bd750912307cec1612bde9c0c967615ac34f4d015ce5d29

  • SSDEEP

    24576:QxrfEXAiIKn+pSBDXQtHjoD4eS8QfuBeeTAi/ZIwoMmoz8qj7UnaBK9PIU/gsjTO:a8QGBeqvBbLQqqIiVTvsBV

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

https://charminammoc.cyou/api

Extracted

Family

lumma

C2

https://charminammoc.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3352
      • C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe
        "C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2492
      • C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe
        "C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3336

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2492-0-0x00000000753AE000-0x00000000753AF000-memory.dmp

      Filesize

      4KB

    • memory/2492-1-0x0000000000B70000-0x0000000000CCC000-memory.dmp

      Filesize

      1.4MB

    • memory/2492-2-0x00000000753A0000-0x0000000075B50000-memory.dmp

      Filesize

      7.7MB

    • memory/2492-3-0x0000000005690000-0x00000000057C2000-memory.dmp

      Filesize

      1.2MB

    • memory/2492-4-0x0000000005990000-0x0000000005AB8000-memory.dmp

      Filesize

      1.2MB

    • memory/2492-5-0x0000000005AC0000-0x0000000005BEA000-memory.dmp

      Filesize

      1.2MB

    • memory/2492-11-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-6-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-31-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-55-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-69-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-67-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-65-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-63-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-61-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-59-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-57-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-53-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-51-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-49-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-47-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-45-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-41-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-39-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-37-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-35-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-29-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-27-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-25-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-24-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-21-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-19-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-18-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-15-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-13-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-9-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-43-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-7-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-33-0x0000000005AC0000-0x0000000005BE3000-memory.dmp

      Filesize

      1.1MB

    • memory/2492-1328-0x00000000753A0000-0x0000000075B50000-memory.dmp

      Filesize

      7.7MB

    • memory/2492-1329-0x0000000005BF0000-0x0000000005C74000-memory.dmp

      Filesize

      528KB

    • memory/2492-1330-0x0000000005CC0000-0x0000000005D40000-memory.dmp

      Filesize

      512KB

    • memory/2492-1331-0x0000000005D40000-0x0000000005D8C000-memory.dmp

      Filesize

      304KB

    • memory/2492-1332-0x00000000753A0000-0x0000000075B50000-memory.dmp

      Filesize

      7.7MB

    • memory/2492-1333-0x0000000006660000-0x0000000006C04000-memory.dmp

      Filesize

      5.6MB

    • memory/2492-1334-0x0000000006020000-0x0000000006074000-memory.dmp

      Filesize

      336KB

    • memory/2492-1340-0x00000000753A0000-0x0000000075B50000-memory.dmp

      Filesize

      7.7MB

    • memory/2492-1338-0x00000000753A0000-0x0000000075B50000-memory.dmp

      Filesize

      7.7MB

    • memory/2492-1344-0x00000000753A0000-0x0000000075B50000-memory.dmp

      Filesize

      7.7MB

    • memory/3336-1345-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB