Analysis

  • max time kernel
    120s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 20:16

General

  • Target

    file.exe

  • Size

    866.2MB

  • MD5

    f60a44463804e2bb5426e6702c6ac7de

  • SHA1

    c8db06d0a3d74f17b1f7c956aa3ece7ee8a134dc

  • SHA256

    888ff4b4bd55849606b85e258c2baeb82833791f33c4036cb85775c5e490664b

  • SHA512

    c172dc7e73a5fcc826ba3e48752c4d755079c3d053a68ba0652def9a1b5a9591cc7493bdc0d73057db2e332b070fdae9b115b3a762be230ac7079f5f21bfc127

  • SSDEEP

    196608:U0o55K6f2aVCANr5cHrAABoYvCO+SWDyUAT:+5MQVhNr+LAABRT+SuFs

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://changeablemagent.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Apparently Apparently.cmd & Apparently.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2228
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:584
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2876
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2836
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 322521
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2232
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Terrible
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2932
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Cats" Ny
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2316
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 322521\Surround.com + Barbara + Houses + Switching + Crossing + Stability + Complaint + Forward + Sets + Filme + Demonstrate + Gilbert + Allocation 322521\Surround.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Flight + ..\Seminars + ..\Charleston + ..\Starter + ..\Threaded + ..\Na n
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2972
      • C:\Users\Admin\AppData\Local\Temp\322521\Surround.com
        Surround.com n
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2028
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\322521\Surround.com

    Filesize

    1KB

    MD5

    ff0457d8ec5aa3911d1881b71e9c787e

    SHA1

    136fa65300d6247f92c2b4d5b38b072b72755432

    SHA256

    aa9cd91c2208ec7138745d2cae9dac82cf5aa19725453d97c0b81c0906999a00

    SHA512

    36442b3952c5c5e5991aa15821c0d68303e00b8a910b1342748f57dac59a47434eba0a46216362f83ade02d7e119edc3eaa05dccf1df6979dbe76c6a9b8c4caf

  • C:\Users\Admin\AppData\Local\Temp\322521\n

    Filesize

    446KB

    MD5

    d1ba40cddaca23639a0b39a99cd13317

    SHA1

    58bbba48e7f3369a8a8fa87b4a9d65e90a886c18

    SHA256

    758b8109c6ca350afe01eaf357ca8b2199426779bd48b41d0b9f9be72468da5c

    SHA512

    540484c6518640cd323d388c2b37156763715ddf8a2198ee4539231ed0467b3a2c3d6d92dce9e44317caf6a72d2c020faf4841ec57325f608e256511bcfb6541

  • C:\Users\Admin\AppData\Local\Temp\Allocation

    Filesize

    16KB

    MD5

    274843d839e275cadabaef7764ebe088

    SHA1

    e5787d3b395be0459c5b9440010ca78d64bec57e

    SHA256

    c572f30dbab65e4bea81d1e47b2f4f18ab2069a6032c10ca6e7f9617111093bc

    SHA512

    2d12cab821ef01ee5681f16ecc52e1da1ff1c8a36fb58146883a58a36fd3f6d75726463a8524a0e131f8b6307a3fd50f3f4baf648cb4f3f29d75caa634552d6d

  • C:\Users\Admin\AppData\Local\Temp\Apparently

    Filesize

    13KB

    MD5

    c11a120ec1d361329c1436b220f8aa48

    SHA1

    83439ddaeba2ec4b3a411ca961e51d43f2145225

    SHA256

    c0c6ba8fc175716888b9b7a9c1be079f3071f5c5a7d480e96a2d95395038af21

    SHA512

    33b2be0da0d414b1ed22867903f68e15076a267dfa91f8ff58f5981c728737956c139a43bbb0ca8a4068afd05d896fc0f07cbe3bd6b73db7bcebb80848cc283a

  • C:\Users\Admin\AppData\Local\Temp\Barbara

    Filesize

    109KB

    MD5

    e7431ef2fb44d664149b0808b4b908de

    SHA1

    c73bd9729309a2f60bfa840ccf82732110d0d603

    SHA256

    dda1fe69b35c23b377b6425cb79df7b46cbfd940820da789a6be2712c24a47b0

    SHA512

    f89483fecc41918e5a4ebbdcb641f3e29eab981ab16233ae7b68f388fa91b3d6c3151f95757a8ae72b9565c3caa882bea782fff7dea925da78b1d3cfb1ad99ea

  • C:\Users\Admin\AppData\Local\Temp\CabD58A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Charleston

    Filesize

    89KB

    MD5

    2c585a7b67a1d98b8536859a58ce2b9d

    SHA1

    17c4dfe34cd95206eb47cd0651e16eeb0663d2ce

    SHA256

    6f39de4b12ca8af0d910c3eed160ded4fd8231d879ef3a35e49b75f836e6d3ab

    SHA512

    550c7062d947e5f877dec1914fa867fa7a712a8581bd47508ddcaf1da3548758b5f4bae6d98f28ce0fc02fb5f0214828e15421fa29955d7db036fcf4ff1086ce

  • C:\Users\Admin\AppData\Local\Temp\Complaint

    Filesize

    53KB

    MD5

    a45bf9c4f0cf591fb07c9525b64d41b1

    SHA1

    85efe9cd10d7e3a92d732f9c34884cd0cc25f3cf

    SHA256

    df926f63a0c0bd08e55a45874c466d7db2959fa554bbf2d7b76cdfd621440fd8

    SHA512

    c6f66de21a70dd740db92d38373e42ea0236d5168a07b9ff57ddcea23c7d9346ce710cdb4a2ec024d9aa69d0c9e2c458697ec24ec09ea6b964d30be03acf6586

  • C:\Users\Admin\AppData\Local\Temp\Crossing

    Filesize

    97KB

    MD5

    f4c0a67ffea75cbc56fb4a6033b89a3c

    SHA1

    ff02caa344d4721044d738eb77fb2e67c075f715

    SHA256

    47ca63876c6fc78caffb999c3ab3def79ed0583e3d8f59b04c8b4446da72a75c

    SHA512

    105ff6d94315705e9924a9456236ef78b4fd69fc834b6a6f8e689b93c351becdb2505dee93ddb9cb46b4579a6f9349f85f58809768a65c15a9c730a82e0e3a6f

  • C:\Users\Admin\AppData\Local\Temp\Demonstrate

    Filesize

    71KB

    MD5

    32b3187709de1a51c9bffec6f882e287

    SHA1

    637a13110f61e1911aee21997b33d19298ae17db

    SHA256

    8c58ae3ea84daa17e02a9312510eaab0d732ae74f97fb390632352de587db00f

    SHA512

    7155ba7a2fdb0de2035a14b31e9178c7faa7aedc65fb943eb78f7b2012cfe8cde8cae052131095de30cb24da74b4232901cb6dc1fd5257f28bd0630c19d9b33d

  • C:\Users\Admin\AppData\Local\Temp\Filme

    Filesize

    101KB

    MD5

    9e162de72dbabe87e84d169ecef31805

    SHA1

    49950b23980404fb4ba9028af17a11ab31b2d172

    SHA256

    a577ac3d51e135b44b2c5b11f65565f9012f2d0553a1dec92c249936699b5054

    SHA512

    6175b5abba562097c99a53777e3b5ab8f5fe2b900949549568292203bb2ade2cf1bb432e9ae0d9a41effc191bcd418a3e45442361d787e3905478be693963739

  • C:\Users\Admin\AppData\Local\Temp\Flight

    Filesize

    95KB

    MD5

    7ac1c4026576c8fa05acf9daecfe4c0b

    SHA1

    e5ae2b887ac2a884a1b685a389301380bb68c8fb

    SHA256

    c5b0dbc513094c8511c3fc71aab0eadb37001fff3b46223dd9d832ee402bae48

    SHA512

    84d8885c2abfc8ec6c0c226c50c232667d2f46782a5eb24992195f05ba7d7f04ba31d90e1255c7b9d9964fa4fd4022500935d8a508d2087368552e4d3d6ab076

  • C:\Users\Admin\AppData\Local\Temp\Forward

    Filesize

    50KB

    MD5

    9b5e5592059de2170ebe48a98b322025

    SHA1

    401a1bcf122f86214846c582eecdebe98b37cb44

    SHA256

    35b6712b9ad3ff71cf156c7317fed2dbc31bdfce180c2f898d8c2190d5d6c6b3

    SHA512

    3e4309d68f4bc5a41ea612fd8055828a62e8b9f1880aef75cf86e53fdca3b0a3b7470ff703000870d2e49eed04d1ec4517afd12a3adb7120a88ef299e116d78c

  • C:\Users\Admin\AppData\Local\Temp\Gilbert

    Filesize

    86KB

    MD5

    ba68c6c44f297218d10f01e86c17c90b

    SHA1

    4784c8e12e80134b0b8bb650c770e966a8e517b5

    SHA256

    f7171608af57bd5cc3e59fad790895a8e4c18bc8b24f770bdde75fd4290e1c1c

    SHA512

    5841b3209aae090958b5829fd30d8a8a49bf6e2c8352a545b7bc25e8f0f54da31bcd6542c0538ec8aadf1a7daee913872e98094b9053b4071025c7560d054d26

  • C:\Users\Admin\AppData\Local\Temp\Houses

    Filesize

    116KB

    MD5

    8ef8a60c73d637b10a1cf736b92768b9

    SHA1

    55b9cc68049472735103b2d9966ac98bb8163e4c

    SHA256

    7beb885be98eb1ecb56e744f69ab0431c17a72af61e820172919c9ace11e6494

    SHA512

    58bc9ed1b246031ab2b88e7b686c99c340cd11b3573b0f0bcee22acd080f4bfc9f3c3588c5ebce05def7778d46c8d9d470841c38f8980c4a107030cba068642a

  • C:\Users\Admin\AppData\Local\Temp\Na

    Filesize

    35KB

    MD5

    579a28afbea0a933e64c964b4b4e8462

    SHA1

    29d6edd7b7eeaace020b4a2dc3d3b3c4d1aceecc

    SHA256

    f79e4ec4a0a0fd6931c06311e5648bece5041aa26df908a0f855dc2ab4d5414a

    SHA512

    75de871b5506603176238f8d675d9e1c56ec8bb241bf8c8ee3d24a1e9d42a927a781a040568d8e41dedb2ab56e76ced7c3a2c9e012d5c7f0797b6f2875b12901

  • C:\Users\Admin\AppData\Local\Temp\Ny

    Filesize

    1KB

    MD5

    cd441bef7de46bcd2879db4088be98d3

    SHA1

    54bc3cbdff68ab7e4a0b4ce3b566f9c8a2c8f6d6

    SHA256

    c2c196b36722b8cb9d61c6cda37b6a7887ccafd79e024bdfaa5c7b460b2316e4

    SHA512

    794aa749837dddf20c672e7b469cc221d7fca05e5166e0ad69f3e2344b5ddec6bce524169095483443ff659306d926bad21c79457a6e6edd328c1a6aa3688c8d

  • C:\Users\Admin\AppData\Local\Temp\Seminars

    Filesize

    84KB

    MD5

    5de8dbb07b76e9962549125ef64dcf4a

    SHA1

    c416ec3b86153732a957aa7dc0c9e93770ed80c0

    SHA256

    bd1d3c1f95703104bd5b7578c7864c42cccbc79d73113df1126005339b0e73bc

    SHA512

    147d30e729b65367b0c37a5aaf7d899ec9a5b4639f4b84e191180e236438bed99c6fdd575657161923a8c958e7352d72c0418f20f5fac555b4fd872a1d34feef

  • C:\Users\Admin\AppData\Local\Temp\Sets

    Filesize

    70KB

    MD5

    62a2332037e15acec32b4ad20009ed9a

    SHA1

    22308e0ed38ac4a5b2cc3c4087e33d59da38eb1c

    SHA256

    fdaa1053863929a94f20284eb465007845107e67436cac6dab1b143854048a1b

    SHA512

    851704141718cbf1df909934929b1264c6a3e7b761cb3ed8bf551263a1db31af0595e74271ee6a187e1541ac2ee3d8121d20aa166c07a337668826ec48a37de5

  • C:\Users\Admin\AppData\Local\Temp\Stability

    Filesize

    96KB

    MD5

    1f0b2ab9d5e8e789c51142a149eb41df

    SHA1

    d029f378da0417f3dc6fd4881c168e278a1e4544

    SHA256

    ce149552c1140c0c07e273073f7dc7c2cc93e75c02faae8aaa113e4ed961427f

    SHA512

    a8a2771f637b361a8631aa6e672656da658d6c577b2897d91ec7d4bcdbfec3bb4cf8a6783909cf1ce9c1b0b8ed664038c2355ca1fd18622986ea33ac138be7f6

  • C:\Users\Admin\AppData\Local\Temp\Starter

    Filesize

    80KB

    MD5

    4ecedeca53815bed7085bd5f46262441

    SHA1

    7729f944454ad12adb37d457e7958cfe85bbefcd

    SHA256

    173b20f7b95e72a142fbafed754651b560b0425b685027922854116821d6ed94

    SHA512

    cf4dd1396f88fdaeedea123911d53a10578115e0aaee24038d82107fc5eaa59ecbe88320e25a5ca69b00ebad79373376f9afbc066860c2d672d2828b080195b2

  • C:\Users\Admin\AppData\Local\Temp\Switching

    Filesize

    58KB

    MD5

    90a3052ad821efd4649e75aa31a2a3b9

    SHA1

    0ce828432dc428a5462959918c14607dd8ef110b

    SHA256

    43422181830de753f3439fa20c427b572be961d0a92acfcf625d24cc3579d62c

    SHA512

    5cc56c675950fab319b490095aa1629a0cc10ab5894d6ef9b34d28f9f0aacddc07d602e64dea01bd87b0cb0cc5f6897c1f9207f35d8bb3a1a69080aca01c7e59

  • C:\Users\Admin\AppData\Local\Temp\TarD5FA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Terrible

    Filesize

    477KB

    MD5

    fb134c6b649f03bf19dbbab880b87918

    SHA1

    3529cfa8bba37eae97c3d5c964c4ffc15d12c132

    SHA256

    2ab5e019e80d10a9154ddac2780ff4d9f2fc46a1337c930dbea3070efc44f7fb

    SHA512

    beca8f3b9f2f058b6427d53ceb4c18acb1e57579a0c78a86584f20b5911674d7156ce50c7ba182eda5c22bfa264064a5aae38c1ee4bf063fe1fca39b387e5d47

  • C:\Users\Admin\AppData\Local\Temp\Threaded

    Filesize

    63KB

    MD5

    e7c16fb66366b18ba816cb2743e7a0af

    SHA1

    f2849171c2feb7a26525b26b3171a1c47738808b

    SHA256

    d34c005cc208a5e59a127e18f51d8df7d8a0df053c39757798b85c6cfe2849bd

    SHA512

    47cdebbd44faeebc1663029497ce208bc6b9a4936049b6b7b9cb5e1b20fa941b782a2a45616e96cb2b37e991b4523a095a638e2b7fc9c8596c2730a3e8dcf904

  • \Users\Admin\AppData\Local\Temp\322521\Surround.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2028-77-0x00000000040D0000-0x0000000004125000-memory.dmp

    Filesize

    340KB

  • memory/2028-81-0x00000000040D0000-0x0000000004125000-memory.dmp

    Filesize

    340KB

  • memory/2028-80-0x00000000040D0000-0x0000000004125000-memory.dmp

    Filesize

    340KB

  • memory/2028-78-0x00000000040D0000-0x0000000004125000-memory.dmp

    Filesize

    340KB

  • memory/2028-79-0x00000000040D0000-0x0000000004125000-memory.dmp

    Filesize

    340KB