Analysis

  • max time kernel
    39s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 15:47

General

  • Target

    appFile.exe

  • Size

    849.2MB

  • MD5

    fd6d84c95104e45deedda3af25de54ab

  • SHA1

    60dfd364afb0214ffc5ed3efda4d45a72c919fea

  • SHA256

    2f1f7a168292f037c5fe36712ddff61d85b6b02515302bafd1d7d563fec2ad67

  • SHA512

    340294300bfcd171ce3f0cf954ffcfecf50d7b82e8700348893d30a5be7c8d9c4db1f2770af7c1c7ef378d3551302cdb92833c07f065b9aabcf2337c34044266

  • SSDEEP

    393216:mRpKL7pt6UTUxOtUq8+OHELsFWEjjmAbwoNKZ+XsBXNS35Vs7e07nbX2sAYoI:gKPuFx0URr/K+X134nby

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://openlievenj.sbs/api

https://fraggielek.biz/api

https://grandiouseziu.biz/api

https://littlenotii.biz/api

https://marketlumpe.biz/api

https://nuttyshopr.biz/api

https://punishzement.biz/api

https://spookycappy.biz/api

https://truculengisau.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\appFile.exe
    "C:\Users\Admin\AppData\Local\Temp\appFile.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Goods Goods.cmd & Goods.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1868
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2184
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2772
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2792
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 615240
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2780
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Paragraphs
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2760
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "SMS" Juice
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 615240\Telescope.com + Mg + Pathology + Advanced + Youth + Wishlist + Resource + Marked + Levitra + Diff + Initiative 615240\Telescope.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2592
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Disappointed + ..\Las + ..\Lopez + ..\Specifically + ..\Workstation + ..\Zoom S
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3008
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\615240\Telescope.com
        Telescope.com S
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:484
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1468
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1936
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1052

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\615240\S

        Filesize

        457KB

        MD5

        4c71901c16b63acdcf93619946ef074a

        SHA1

        e9af5f9459db6062b5baaeb1c55b36a9cee8d1e7

        SHA256

        c9a00566cea28727e2d4af00e9675be3020327acc4212706fbd8a06b36eafa2f

        SHA512

        66ea275601a3aa9486bde90b14528b911cfdc8d7f9e20d0f75033c2062215cbc389b20b9b299011348f4f403a933bc8b6884dcb2e7eaf4bfec9158fea53b7a08

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\615240\Telescope.com

        Filesize

        305B

        MD5

        1f1cf733b6b5cdfba30e98c3e196049c

        SHA1

        c9386e8074d5f1a69b9e7db99bdc4bdbd37cb648

        SHA256

        4fff467dd20a42a617761f90250ac13500f9d55b17d39aa56f7ded9e5ab40285

        SHA512

        d350f7cc5d40abce1b08b7be1a7b98e1223c71d048a92951511a171c3f896021caf8b595440aeac0040a46c22c3c9a57a00533bf32dbe1bfc6902c6c49340b3e

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Advanced

        Filesize

        134KB

        MD5

        6a5be97bc06b18c6dd3edd6f20df1580

        SHA1

        f8d2d54a766616649bbbded8b0271709fae7d1f3

        SHA256

        35eace100455532647ac85345735eb92a3e669bbfbc2499ee2451ac410d88311

        SHA512

        0356c4cf3c62f3c08cc6ff65a1945be229b4051f8e99b606c1693247e4959a337485abbdb73c5757cd2fa39c9f8a05fbb4931eabaf0fa44164ae8fb7879c37b8

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Diff

        Filesize

        78KB

        MD5

        1a3e3f7f530384f2e595ef309540e54b

        SHA1

        090c7166e449fbe287dc8b966c1e68c8c766f800

        SHA256

        346722df333c549ae2bf189ed6403b857977bffb6fa3667c44ec71b2b31c12c7

        SHA512

        c565da077e9927c2880f70930df663ad658cc5a7c721d87dad425d24e00aff0cbdce3511c29716159163c143c324064602559475bb4efbba8802a3b892395662

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Disappointed

        Filesize

        90KB

        MD5

        990551f998c10c3874b7929a2507fb70

        SHA1

        b883604c8262466c1ad392b57ccf0cdacf582684

        SHA256

        ed6d96358890317054b6503c08526fec03c772e30db2c7db09f5f347ce8f7877

        SHA512

        3358949892b1269e6951e6ecd3959342f932eaf19fd2f74a8009f7f2cb558bc93555d234c60184262b55b4b157684141520e2b2b1a28e163b99d36ac1f355c31

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Goods

        Filesize

        24KB

        MD5

        c5155825dd1a2dee591ca6f1ec2bc845

        SHA1

        111e6dc4f38a27a781a735c482bc3b357e376484

        SHA256

        33fd93a4fc1f831d5294b06edffaa3dcc25cde54da61969eab578352ac775bed

        SHA512

        1f96fe12c45bf5f12a2ee033d371fe0910a469374663ad91ad16a158df6199a5486731553d9db87b2c6bf6351865e3d7dee10ee93a8e8f04e21a15db986d6ece

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Initiative

        Filesize

        31KB

        MD5

        d821cba9495ab2144ec602ce1fe4b14a

        SHA1

        6e2f5fea42bb209408c9a1593617458a621079ff

        SHA256

        3e15b11d7092a9c898dbd9bd8d82a6c1733da8c97395b30322d2147a97caa61d

        SHA512

        9d2919f6e6c78d853e32ce995a793548cf5d2b319533258b91ba5a7ec3194eb01f4ef6cf32764d4b37597d1d46ef3568e5a93a5c1a8228e4a64f98e46de97836

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Juice

        Filesize

        308B

        MD5

        3d6d43104b21648ecd547850525ffb8e

        SHA1

        723b0d015652da316568d9bb77a4dfee71f9786f

        SHA256

        df3572e4bfcede3b2e40f2ee616eaaa7fdd9372121e8c33e55c59c7d8ecff8fb

        SHA512

        a5ce5ec7434cde4627d1493c08e03f8f908c55a2869617faa8b87ca1f6137ccfc8c8cc97e90574945050fbc96b67e4ab6e5be326d29fc2b89bd0d05f9c54ecde

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Las

        Filesize

        98KB

        MD5

        b4c47e54ff189b95b934a8338e70ebac

        SHA1

        ff047ea0f529a9f9a70b04ce871a3145e0935703

        SHA256

        320324ea5da6a662fbde7d3c1f92564d19ff6e7596ba6e737990f65db32a4611

        SHA512

        37f547737409aac6084fc912bae3706cbe280c749141a8ce7b376ec3fb91cbe6d222260f638b1bbb95c4b2c00b94142fd7a71eb714d9488b6defbe74fcf3dee2

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Levitra

        Filesize

        57KB

        MD5

        ab44935d7bf326d2410d33555ea579e0

        SHA1

        49d33c442c31e5be5950d3386aae2b834c6c166b

        SHA256

        29a595536c7182ac072221884cd18931f676ab1809068dbdd93d9b6fc1bcfb29

        SHA512

        374b9258d90f05b30793d018e603a36f617df6585de820ed7a1e4671022aba43a83a9faab8324763498b4231708386ef80321f8515907c34ae3a6612b399083d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Lopez

        Filesize

        86KB

        MD5

        be62c324e77802d58b492f21ca0afbbd

        SHA1

        c593f22249ce08620e2ff0ba8219e112ef1818e9

        SHA256

        cbcd6253d15a957ac3910d7cbd9ddff525a8b9c8d0b7763f5924019a418a0bf1

        SHA512

        9fd5c4f1870481947be525b4cc099efa1a382f379b7151142b2c99fb3f064028a03654d5e7d8dc0efe6a64b49b231e51272163dc3669fe7f6f455ecadaafc580

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Marked

        Filesize

        89KB

        MD5

        834d8e65992065741b4ee68645a642cd

        SHA1

        7fd6397b523c1fbf60631be8f561f71858e5f3d1

        SHA256

        da3baa55ecae49c8f7a4043068d2ddc11f9e54c79eb54458eaf0383fc6a9307f

        SHA512

        56f43bcb7f2643715a260d92404d6ae2b90331c06d3750b22d19fdf127b52f1304ea9cdc1157aeb1e182a2403fbfd9d001715e48aeb329fdf743caf4beb86039

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mg

        Filesize

        105KB

        MD5

        a5f08e25c42121616e9c84ea42cacb20

        SHA1

        aa5ef9cfc2cfc16c7c0d6d38b77f71efda94f29e

        SHA256

        32bcb71a7a9035f98eec8439e10ea794220971a7e377c52e5d2f831f48d6a1b6

        SHA512

        7178d82c8d8a92f8d6b159b0f3d527a1396995dd7ace6943c0fdeaa10e6b2df075c61ce95af6018d59c1dac189931453334befa48bde3a4135a0bc2cbc6f8fa6

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Paragraphs

        Filesize

        478KB

        MD5

        fcc320ebb8cb59821c932598aee05081

        SHA1

        5f06031ac1e5f9126619f4912e1aef3b7b3ca072

        SHA256

        a9ef4865a62aeeff48361cb0444cf8b28654d19b08a3ef01d7451edd670d61d2

        SHA512

        1408e625e75c7ebadf8cfeb4bdd58cc2579425ee0080c319b44a748d96a5b7c8f7689d2631f8dcf5df898e087fe8b302482b836237fb86db12c448f3b067304f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Pathology

        Filesize

        145KB

        MD5

        8e0d0a7084c7784460c1c79f285ea61d

        SHA1

        aa043fb6df552f9a15959f51763939ff06740920

        SHA256

        45ad366c57516fa773242b80d937b5ea81de66f2dccc90521123f1c29da5195a

        SHA512

        5e23dfe2a4fd80c242a711c2b809b142b545de34dcb29e13592bd4b67a7641251f1d946df7222004b5cc76dedd70f55827edd2a68ea9316e9191de29c0693978

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Resource

        Filesize

        121KB

        MD5

        5d043688ee5e44456040991f83376a3f

        SHA1

        9e89b5e68dc614b3694786d6a9adeb86dc41b996

        SHA256

        abdffdb3e9ff9e5a4a391d24980ae7f9cef0bc686a7124734e2996a0f8be6a8e

        SHA512

        c038d69706783cb24708f73f6b9a0a02159c38a77dd707ce18da61e1b5cae4bb1be468dbc1c4098a8554b60b5a7b160bfdda0b21f1488ddea648df93016a80b3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Specifically

        Filesize

        74KB

        MD5

        ad0cf7f4eb838651ba0e6edeade3d2e3

        SHA1

        e604ae3f3cd10baff7e573882b4d403a6b7e3b7b

        SHA256

        dad8ed293c89712488ef04fbfc3c8301c37a4805bc4241454974e7826f0e4812

        SHA512

        77eec4bea2e244bf479567c285483947c14fc52e0261b269ea580c9602d191ff9d5aff38be9054e3ba55f0fc8c116f8f1ab291f8d471075d8df1157b7023bbb6

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Wishlist

        Filesize

        106KB

        MD5

        1f593fbf7d25f09ce3e4e8eca9b5fb63

        SHA1

        a4a84e2e7623f65d95a974e5c19086d0e4da0749

        SHA256

        a53d2673e100c99c6d5f05d5edd51d74cb5a11517cf95b2bd31d48c5fe102ec7

        SHA512

        178ad7469234474d10a7dd5bc99160a11f5957180f793451ab5a50bec20e84df2c4eb47017c396d6eb6e244a18d7608e89677f69e667447c791b7c053c0a7b8b

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Workstation

        Filesize

        79KB

        MD5

        64c87a88db76440e2045d0b6673cd54b

        SHA1

        acb1ddb3ffb8766b52d77725a9b499d2dc29493b

        SHA256

        7cec2a0d96cb72146d7b9a1388960e1572d6797d83fb767d1e80f46f0d599cbb

        SHA512

        ff2695cf4c6b7d68e2f9411a734a7ba6166280636673ee11006df6de6281ce1c22cf597d4abc8433c22f09e968f3bb2b87c9c2a7de9642f23dec805621a5024e

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Youth

        Filesize

        58KB

        MD5

        d49b2d4f8129a0767061c0fefeee7253

        SHA1

        3dfcdf1495257bd21c4bc5b80204df104c33947b

        SHA256

        3402b998d22218b252189cb3abb3125957bf1acaa2d10fb84c68254995f52de4

        SHA512

        f5cfc82d8f130bf54c978dafa1226cfe70c2d6c457fc974a09dcdfe3d49c96f152c2d96d3d8ea3f6ebde8f54994292b80d323d69b95e6de8a104216c787e9ded

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Zoom

        Filesize

        30KB

        MD5

        567c04a8ac543a9e1c33271a004f8148

        SHA1

        d6bbc0ec4dea31750367510b1c35be0dbd562ee9

        SHA256

        53b009ed94fddfc7cfb16b6b5b4144cc9b1b61846d9a98200ca8a5aca057e024

        SHA512

        f20ccffc2bb6d6f3baf4eaea519c3951aa2f0c957293f863306a272a3d994131e6a070ea036ffdb06ee971fd042e9cee130f3475d35e88114c2d002f48fd2190

      • C:\Users\Admin\AppData\Local\Temp\Cab2399.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar23BB.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\615240\Telescope.com

        Filesize

        925KB

        MD5

        62d09f076e6e0240548c2f837536a46a

        SHA1

        26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

        SHA256

        1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

        SHA512

        32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

      • memory/484-69-0x0000000003640000-0x0000000003696000-memory.dmp

        Filesize

        344KB

      • memory/484-73-0x0000000003640000-0x0000000003696000-memory.dmp

        Filesize

        344KB

      • memory/484-72-0x0000000003640000-0x0000000003696000-memory.dmp

        Filesize

        344KB

      • memory/484-71-0x0000000003640000-0x0000000003696000-memory.dmp

        Filesize

        344KB

      • memory/484-70-0x0000000003640000-0x0000000003696000-memory.dmp

        Filesize

        344KB