Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 11:21

General

  • Target

    NewInv1.1.0.exe

  • Size

    1.1MB

  • MD5

    ec56f2e52cbbbb1ad1507da08be13034

  • SHA1

    2671ea22d4340ac094fd1076b2fb440e19f112bb

  • SHA256

    1846bc2cf1e352a7214870d2a9439f420dedbb3e3348a7b13a7bb7542f627178

  • SHA512

    0822b4274116a2d212959e0bc2a54a8a22269b067b98be2d132373290fdfc2940be5d7e1f98ec70fedadae03297c00da5d3ae7499a4a52623cd96f7b8ef1e2d0

  • SSDEEP

    24576:lXsUIwgY+tXzdBkFVIZkNha1SeQ7894cBhiAkSd3+g:9HINVdcIZJ1Ss9j0AkSdOg

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://toemagnifuy.biz/api

https://fraggielek.biz/api

https://grandiouseziu.biz/api

https://littlenotii.biz/api

https://marketlumpe.biz/api

https://nuttyshopr.biz/api

https://punishzement.biz/api

https://spookycappy.biz/api

https://truculengisau.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NewInv1.1.0.exe
    "C:\Users\Admin\AppData\Local\Temp\NewInv1.1.0.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Meters Meters.cmd & Meters.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2700
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2756
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2836
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2728
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 212248
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2572
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Complement
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2604
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "cgi" Tvs
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2464
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 212248\Surgeons.com + Keyboards + Integrate + Signing + Nirvana + Charming + Fat + Highlight + Posts + Lay + Semiconductor + Artistic 212248\Surgeons.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2384
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\National + ..\Confidential + ..\Cart + ..\Humanities + ..\Demand + ..\Peas + ..\Routes g
        3⤵
        • System Location Discovery: System Language Discovery
        PID:672
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\212248\Surgeons.com
        Surgeons.com g
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2136
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\212248\Surgeons.com

    Filesize

    1KB

    MD5

    c11076714705fe25e0209c6caa98bcb6

    SHA1

    1861b3029e998174cde954b050d6747739b1c083

    SHA256

    c4ef81953bdcab124b8ed919d67b1195886d2e641083d8d562f1767dcc860d9e

    SHA512

    34d43a26c1cbb5f1917b7d9350e0c433d54e3093b252b386c7e0053d2775dd8943e9038e3712a927e2115964e8a932cc49efe559d110a9ce46670146ea1426ab

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\212248\g

    Filesize

    463KB

    MD5

    530c3434f1693d22f53c45555451b244

    SHA1

    fb47cdaccbd15358fe51a117f3cbdb318a0de275

    SHA256

    cb0011025649c3d39a1f8647680199953c1a16b47faf1af1afa8b4589264c509

    SHA512

    14d52337162003b5ed0bd87cf61dd1a5848dd237da98b705ffe1f47c908bd7949b2a22e9e51407332728babba4de1453724869ee4f597e22d96c1e756d306eae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Artistic

    Filesize

    5KB

    MD5

    5774fd588ff870ad376cf9ff6fe4d080

    SHA1

    db7bfd9cfa2b2ddb5b958869579489e95416d1da

    SHA256

    b18cf0df086f8a3436bb6ffcc192643d2cb45ed852e91eae6833411be6a25abd

    SHA512

    1802eefb7bb4c9f6658bfabbfd65fd84d42431c58da35ba2a8327e6a4859c26c00e843adec6e65b2e094e635fbbfc151cf68f16a011533bc817e96efd5e153d1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cart

    Filesize

    61KB

    MD5

    f8eb8975c19df0e4adac64b842a557ec

    SHA1

    f4acd18b3a24dee28fc50a388a59fac25a73d7df

    SHA256

    89e20e5a963853f21e2322760e300e3ecb52acefa78332f4ad5b55b2738b55d2

    SHA512

    916faccf40ff05e22b84fe3a31e4d21d9534aff9b44e0b797353555d768bc031bde0f257d962f29c7ce009aaa2a1c543ff94013fcbe505e043e55e03a7c4438d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Charming

    Filesize

    124KB

    MD5

    e62283b65279a8bf92fabda6054695a7

    SHA1

    0db2f88f8f5e961c88e2fbe7db07fbf4931a7985

    SHA256

    0daa2006f374f6299a04badc5e5d250e31e7defc1685ba12b48e854a874480f1

    SHA512

    6d3866efebe3a8d365488c9c4be6419e34172e1e97138667a6f330b1ca5fe371b12a9391fc4e8ed340544f8f4c0047bfc0ec5d38fad799860292124a611902d3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Complement

    Filesize

    478KB

    MD5

    7a3096a5aee56c3b631ff6444863032e

    SHA1

    7ac6004a009ea9d0c823da6ac29fa322cc826b36

    SHA256

    05e23e9a26793d65aa3ef5502ff2c7721d3525f88088cb17d1ce062fad285a07

    SHA512

    510bf659f46e199a838926d4663bfb01523ebeffbf7351fafcf4fb729c37fa7d88eae1e4f0c2bdc2c22f13b344985ada89233f01f2a5fd7d943b9d603a4e6896

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Confidential

    Filesize

    56KB

    MD5

    7821523d49b1e8b7f9c482c424dc594d

    SHA1

    bf8e1ef09883a238632cd92e125e495323536b17

    SHA256

    4fbcd80aab85655e7585b6872095055901325db298e954d9aae2f60780642f4f

    SHA512

    d29784b71cbf87cd2b28f5db1d281df1141e27be92d61ef81f6c36c96d888dd055550f104e606a403a066afc5bf692cd966a5ae24932a422871552cd1bb83e36

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Demand

    Filesize

    90KB

    MD5

    8bb2068d76f5a5fd1dcb65ce3d6a73b2

    SHA1

    30f981fc976d01210f2363a11a7c46708ee619ce

    SHA256

    72f8ad3555d5877e6f49b828691aa58efb0012eec05f3c2299526221fe9342cf

    SHA512

    2eed07d2bbec2cb951319007df44fd60370ad176979fc9a1cb0090df1680987b6861dfa97d267acc1cdb1916be728ad7fbe3589afc0594e8b8aa0b2a3a8c61de

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Fat

    Filesize

    69KB

    MD5

    86dfb4d4f7a1adda9a82640b6d35b0e2

    SHA1

    77fe92e668af4c47b766ad02e29a6bc468cbb312

    SHA256

    df7500c4f66983377e79ef45e4276a9a384a327ba145ba331b77eff305f23084

    SHA512

    1d546a521bb24041a67141830f71682dee325dfa86ccc9c479173f187c8533d2785313aeac2c3b1db3ebfbf44b28187385c7c61ac17f5138e575c0c93a9c0510

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Highlight

    Filesize

    125KB

    MD5

    85d7c2c5e056e4a21878360548f0fa36

    SHA1

    f02d73e6fe479762d4c83ad47315fa10fc84b075

    SHA256

    82a98874e4ba9240eff71725b227d06316f28c3fc7ba0dcf4956484e80f7901d

    SHA512

    a4a0013a1193f49a2a4dcdd548c6b872016185061fb6c669a12da2c5a404a7396ed3837570162f4b1beb23e3a23fe46eb74566c95f454808f953b89776d7a518

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Humanities

    Filesize

    85KB

    MD5

    639a227778f1370837e87b2ac06d05ea

    SHA1

    358532a2eafbb9159b516ce9f9d76240dec8b426

    SHA256

    1106498084ae1e7f0e04981b818df2c8e3f2c80de887c42a9651b27fecf4f1fd

    SHA512

    f9fbfe06dbdb890f0718940b371a2c8019d3ae9680e5e69e88cb467141d5e3703b0b38c7b84540185805479c11f346c7eba43e63cd58af376c7cd78fc2310b8b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Integrate

    Filesize

    131KB

    MD5

    b9ee068d114421763c9d10aa50c8cc63

    SHA1

    a331db04db854ae06f953395d61dd7c71c3dcb97

    SHA256

    070d6987e4592272a1bed7a4a5e3e0bb8e8509ee45fb5aa43cf78b815bd4f36c

    SHA512

    f46768837751306f6da8d8147e1528dc0a7f05ab347c9d92f6bbc8ad1258432896b6aed0d759e3396e628f0b42bff30858be7290af20fae991b29a390e2599dc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Keyboards

    Filesize

    58KB

    MD5

    cead9e6935ad1d2fd2add4b10ca27a6b

    SHA1

    ce812c48af8452bef5dfbaed44082b4e75b0733a

    SHA256

    944749c33f419f64ea4b73fb62ae300ad38d3e2869ea1f9512bbee1451a8cb8f

    SHA512

    537ce4c66d8435a6de2d7546997c8e4dfd65addfeb3546c34fa17502b687e31c13831607b7cb04d1ac280da95d11c79fad71555a2eae99ef76d1521e248048c3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Lay

    Filesize

    77KB

    MD5

    936598eaddf54465dc8baa64215986a4

    SHA1

    8fabc57de628206f35ca2e65c015215f579c831e

    SHA256

    bea63e45dfb58e89bb140a031b74431859f0ebb12bc5c95d810c484251bfc21a

    SHA512

    70879f9f51ae19a2b7a4d907240b48de6b62c54d372ae0226ee00714bd86f67dd3e3ce7347b44b89ef77c56c840555aaec8f173cc8c0463344f0a87cd69d7da6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Meters

    Filesize

    26KB

    MD5

    9ab61c1120917df9d09207973ea071f7

    SHA1

    3ee91d62b8c4176e5d56ccc2277b1c5403c4e521

    SHA256

    65a70fa3c59aca47c345b79240243154925295f5d3350862faaddec2131430c4

    SHA512

    c20086ed148bde8737525fc0f731de6d854dfc935aa173793441dbb18e5037cfb6d9ba9a62c45dbc215779d1c54a7767d9391658a20d326ce8ff2eee56a609f5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\National

    Filesize

    58KB

    MD5

    0966734c9fee7283f3bcad06603c6702

    SHA1

    0cc5b5ce8dba957916ba30c6795642fbe058dbbd

    SHA256

    712f475a67ec383cd6dda47bb2e551c4989844d9559390f14ae2b3bfe189f567

    SHA512

    a0178f8d50a58e75f7a2d93188b56ce71e514a56d522785e2409f750c0cf7cc51917f64107a7fd3adf2a0474a2a9f9f4fad911db94bc82aaab6653a5fe6a4525

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nirvana

    Filesize

    80KB

    MD5

    b48c4e815f2499b2e472dfbe61c65c6e

    SHA1

    a711526ed111eb85cc5879e5abcc98a7de3a1be3

    SHA256

    36d21aee65f3313509dd058420fb25f7337b66edec5626e395c3b8554273d8a7

    SHA512

    7d98596ff32e131f0731673ce3d5bcfef9bc3235540aa8d92d88e707ad823029cbea214cfd5490eb644e3f2540e3c50975f7d6dcca6b6ba2cea4822ea2fc8c99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Peas

    Filesize

    65KB

    MD5

    04da8c43e6b809eda59d214022bdceda

    SHA1

    39d5b2b08519a2aedb28bb5f7e26cdc54dfb59eb

    SHA256

    23df97e902ed346156117d05f9d4777640eebaad86348ae61885b85eaf8137e0

    SHA512

    cfa601b2e636d81f8c9404e2be74a6d457208286c610e5ed2477db7d13b6cfb443c2782914b03699788f217fd3fe17095868519dd07099ed9718196cb2128f4d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Posts

    Filesize

    142KB

    MD5

    263757e90f3f37226bb1ce72e4338836

    SHA1

    aefc45d170ac67965ab6cab83749c3448b19e633

    SHA256

    c1ec3bd2c32f4adabbb301c48ded6008c498813b932497d6060df61980989b76

    SHA512

    1497df221301633b59c41952def56ac1d5a951be22dd0119e16d7e9abb7d9b12ac945b2b385c98d324647f92257c7a9f3cfe0c7d3619275f54fa5ccd3e2f1527

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Routes

    Filesize

    48KB

    MD5

    d7e978da8a3f1dca2340f813c7da3adb

    SHA1

    79bcdb824771eb3dcb425c1fd894f1a62cd69324

    SHA256

    57247c77a08ab10a1c80bbde737ce3d5a43ac17033cc7ddbcacbfda54c859d84

    SHA512

    657558c78f90cbe31e3427718d74a6b79360e15084c3cb5891decbcf8917535c1f896abbfaf92856ff6005a313a36f43bf338b1fb9aeb535e6f3ecbcef4db1cc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Semiconductor

    Filesize

    60KB

    MD5

    0cb4eb4d5f485df086884a6be043eb92

    SHA1

    c52ee2cd9368a7b46c4350edf107912e5d28e401

    SHA256

    678503ca52c63d28755d24653239c34033772231b351016e73b8a83ce918e886

    SHA512

    f81bfdf03cea24ebeb371eccf9ec6e1d8ddd3eea9364beeb61fe39a2bfc6eca005fdf16c19db0c4cd2c856aaf7545be3e3b6659fd6196e1236b2833b732251a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Signing

    Filesize

    52KB

    MD5

    53d2d146d1250598fa4d9a18a8b304e4

    SHA1

    178c507271d8d651ae4033b2356f7babbb3ac399

    SHA256

    b2b32aa3f783b0745d3ec56ff935c815031fd00f1bb25d71e0c8755d8cf3a1d2

    SHA512

    211cb765d7077ab6915a941653c2b4c63d1d29e525652ded4d5062a3aa77eba79969cabbbe5f0710e241786701b4b3bcaf58b2d1db6f4e0c842599a59458ae61

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Tvs

    Filesize

    1KB

    MD5

    b439fb30ff31111ecfb3010a54a2e465

    SHA1

    4716df6e8d58de17e4893e6b875ce16614a594fe

    SHA256

    80f7d4a734554fd138fe5625f2d5d3aec8852631cfe9909fa04b333a36d9b25a

    SHA512

    75504a37dfdf8a0ace75895a103c313460f08819a6106667e430bf2c72d8abdbeefd9f7301d11b1b974f0d4ccd16e541935076bd09d4c8ebf808b0fec5277a70

  • C:\Users\Admin\AppData\Local\Temp\Cab8CF6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8D18.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\212248\Surgeons.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2136-76-0x0000000003780000-0x00000000037D9000-memory.dmp

    Filesize

    356KB

  • memory/2136-75-0x0000000003780000-0x00000000037D9000-memory.dmp

    Filesize

    356KB

  • memory/2136-77-0x0000000003780000-0x00000000037D9000-memory.dmp

    Filesize

    356KB

  • memory/2136-78-0x0000000003780000-0x00000000037D9000-memory.dmp

    Filesize

    356KB

  • memory/2136-79-0x0000000003780000-0x00000000037D9000-memory.dmp

    Filesize

    356KB