Analysis

  • max time kernel
    42s
  • max time network
    43s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    10-01-2025 15:41

General

  • Target

    s0lara executor 2026.rar

  • Size

    1.3MB

  • MD5

    e2ce4cc6f2f6c0ea343262a7b88ba908

  • SHA1

    63a3fc798e90242131cd169cd75d69284d4facb3

  • SHA256

    ec6bf11908f7509cec1e00a361fba9bb7d1fe5e306c39c3a50b82fac24fe28ee

  • SHA512

    f059cecc72a10b367f9e68fb54d848b0227ee51368876a586bb542d9d63cce77ae24d8544216e1f390faba5d4bacc83eec40c760714fa226177180e573613c9e

  • SSDEEP

    24576:qGGtRMe86AOPXdlyQr1B4Y4OIcR08YI9e/l22jZlIZXeyEBtLPnffhjDkpz:qGGt5qCln4YYcRQ227IZXeFBnfxkR

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://scaredsensa.sbs/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\s0lara executor 2026.rar"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:632
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4296
    • C:\Users\Admin\Desktop\ReleseeBoostrapper\BoostrappersN.exe
      "C:\Users\Admin\Desktop\ReleseeBoostrapper\BoostrappersN.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4064
    • C:\Users\Admin\Desktop\ReleseeBoostrapper\BoostrappersN.exe
      "C:\Users\Admin\Desktop\ReleseeBoostrapper\BoostrappersN.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2616
    • C:\Users\Admin\Desktop\ReleseeBoostrapper\BoostrappersN.exe
      "C:\Users\Admin\Desktop\ReleseeBoostrapper\BoostrappersN.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:4700
    • C:\Users\Admin\Desktop\ReleseeBoostrapper\BoostrappersN.exe
      "C:\Users\Admin\Desktop\ReleseeBoostrapper\BoostrappersN.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:4332
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\ReleseeBoostrapper\BoostrappersN.exe

      Filesize

      4.2MB

      MD5

      04602651f127a19f43bfcad57514d552

      SHA1

      2c8a0b841bdab3b5c77794a2bad2be1e08d29d86

      SHA256

      a6e4e665ebfe59d7bf884c1750bcdd8cddb77fb537e9d1018efe28abf8945d53

      SHA512

      ddca046391d6318e80b7fdfe335cbbf26ed53ba6f8e2b632aefba1fc34385790fff0a6ac52406fffa7d0a7ab20e25ba1833956a826ff03851b6c80467852db9b

    • C:\Windows\System32\8kkdna.exe

      Filesize

      7.2MB

      MD5

      f6d8913637f1d5d2dc846de70ce02dc5

      SHA1

      5fc9c6ab334db1f875fbc59a03f5506c478c6c3e

      SHA256

      4e72ca1baee2c7c0f50a42614d101159a9c653a8d6f7498f7bf9d7026c24c187

      SHA512

      21217a0a0eca58fc6058101aa69cf30d5dbe419c21fa7a160f44d8ebbcf5f4011203542c8f400a9bb8ee3826706417f2939c402f605817df597b7ff812b43036

    • memory/2616-18-0x0000000002C90000-0x0000000002D53000-memory.dmp

      Filesize

      780KB

    • memory/2616-34-0x00000000009D0000-0x0000000000DFD000-memory.dmp

      Filesize

      4.2MB

    • memory/2616-22-0x00000000008C0000-0x0000000000917000-memory.dmp

      Filesize

      348KB

    • memory/2616-26-0x0000000002C90000-0x0000000002D53000-memory.dmp

      Filesize

      780KB

    • memory/2616-23-0x00000000008C0000-0x0000000000917000-memory.dmp

      Filesize

      348KB

    • memory/2616-24-0x00000000008C0000-0x0000000000917000-memory.dmp

      Filesize

      348KB

    • memory/2616-25-0x00000000008C0000-0x0000000000917000-memory.dmp

      Filesize

      348KB

    • memory/2616-21-0x00000000008C0000-0x0000000000917000-memory.dmp

      Filesize

      348KB

    • memory/2924-44-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/2924-47-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/2924-37-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/2924-35-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/2924-36-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/2924-41-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/2924-42-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/2924-43-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/2924-45-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/2924-46-0x0000026BC2DB0000-0x0000026BC2DB1000-memory.dmp

      Filesize

      4KB

    • memory/4064-5-0x0000000003510000-0x00000000035D3000-memory.dmp

      Filesize

      780KB

    • memory/4064-4-0x00000000019F0000-0x0000000001AB3000-memory.dmp

      Filesize

      780KB

    • memory/4064-20-0x00000000009D0000-0x0000000000DFD000-memory.dmp

      Filesize

      4.2MB

    • memory/4064-8-0x0000000001390000-0x00000000013E7000-memory.dmp

      Filesize

      348KB

    • memory/4064-6-0x0000000003510000-0x00000000035D3000-memory.dmp

      Filesize

      780KB

    • memory/4064-12-0x0000000001390000-0x00000000013E7000-memory.dmp

      Filesize

      348KB

    • memory/4064-11-0x0000000001390000-0x00000000013E7000-memory.dmp

      Filesize

      348KB

    • memory/4064-13-0x0000000003510000-0x00000000035D3000-memory.dmp

      Filesize

      780KB

    • memory/4064-10-0x0000000001390000-0x00000000013E7000-memory.dmp

      Filesize

      348KB

    • memory/4064-9-0x0000000001390000-0x00000000013E7000-memory.dmp

      Filesize

      348KB

    • memory/4332-57-0x00000000010A0000-0x00000000010F7000-memory.dmp

      Filesize

      348KB

    • memory/4332-49-0x00000000009D0000-0x0000000000DFD000-memory.dmp

      Filesize

      4.2MB

    • memory/4332-63-0x0000000003170000-0x0000000003233000-memory.dmp

      Filesize

      780KB

    • memory/4332-32-0x0000000003170000-0x0000000003233000-memory.dmp

      Filesize

      780KB

    • memory/4332-53-0x00000000010A0000-0x00000000010F7000-memory.dmp

      Filesize

      348KB

    • memory/4332-56-0x00000000010A0000-0x00000000010F7000-memory.dmp

      Filesize

      348KB

    • memory/4332-55-0x00000000010A0000-0x00000000010F7000-memory.dmp

      Filesize

      348KB

    • memory/4332-54-0x00000000010A0000-0x00000000010F7000-memory.dmp

      Filesize

      348KB

    • memory/4332-68-0x00000000009D0000-0x0000000000DFD000-memory.dmp

      Filesize

      4.2MB

    • memory/4700-48-0x00000000009D0000-0x0000000000DFD000-memory.dmp

      Filesize

      4.2MB

    • memory/4700-60-0x0000000001820000-0x0000000001877000-memory.dmp

      Filesize

      348KB

    • memory/4700-59-0x0000000001820000-0x0000000001877000-memory.dmp

      Filesize

      348KB

    • memory/4700-62-0x0000000001820000-0x0000000001877000-memory.dmp

      Filesize

      348KB

    • memory/4700-58-0x0000000001820000-0x0000000001877000-memory.dmp

      Filesize

      348KB

    • memory/4700-64-0x0000000003460000-0x0000000003523000-memory.dmp

      Filesize

      780KB

    • memory/4700-61-0x0000000001820000-0x0000000001877000-memory.dmp

      Filesize

      348KB

    • memory/4700-66-0x00000000009D0000-0x0000000000DFD000-memory.dmp

      Filesize

      4.2MB

    • memory/4700-29-0x0000000003460000-0x0000000003523000-memory.dmp

      Filesize

      780KB