Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 01:53

General

  • Target

    cb0115723aafc140ff90329b58d1c24fadba10e366ee0972b565c973662b95efN.exe

  • Size

    3.1MB

  • MD5

    8483febc34d0b275b35727486f11c400

  • SHA1

    6450210de1390361ede70a64ffad70909aba9f92

  • SHA256

    cb0115723aafc140ff90329b58d1c24fadba10e366ee0972b565c973662b95ef

  • SHA512

    e9355a983a022945b8c10133683753a8ad9639daae9b48662ed1bec5e5fd8d192d515b0bb059f92ef0fab43bb77a1164a9fbb358f731ad69da2b47264d3d315e

  • SSDEEP

    49152:CMKO1on9iWK6q/C3luTg5Iokb7yfFTW8ibDw348JKVi+KmD6gAGbnwF:C01Zb6qwuoIpb73Fb84oKzJAG

Malware Config

Extracted

Family

lumma

C2

https://showpanicke.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb0115723aafc140ff90329b58d1c24fadba10e366ee0972b565c973662b95efN.exe
    "C:\Users\Admin\AppData\Local\Temp\cb0115723aafc140ff90329b58d1c24fadba10e366ee0972b565c973662b95efN.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Users\Admin\AppData\Local\Temp\Hackus.exe
      "C:\Users\Admin\AppData\Local\Temp\Hackus.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3940
    • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
      "C:\Users\Admin\AppData\Local\Temp\Crypted.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Crypted.exe

    Filesize

    154KB

    MD5

    078dd8a7d37a595a810bc74259df2da4

    SHA1

    f907f1c7b62b2fdc8d271c574fe69974c3196ec9

    SHA256

    9043fddbf88a56f784bf4d52c3ddf7837cc8206e77fe831755e8ec511e5d4329

    SHA512

    59bfe3b445955f2e6e33972fbfd5b27b8a28ad5d2222723155ba282bde323e788c50b2ea4f22bd4c714935f3502baf2cf7ae32173384af0fcddac3398119d963

  • C:\Users\Admin\AppData\Local\Temp\Hackus.exe

    Filesize

    2.6MB

    MD5

    b98582a96f3d102a3d45e7ed1111268b

    SHA1

    b1f4886d90acf2ab70477a043dea8b668a7494bc

    SHA256

    fb5518b93f5a75c4ddb033a5a1e8189d2e8177c863c8b86c0adbb2de90a928a3

    SHA512

    51530cbd2a90a0687203132ea5e8a40c7dd0ff3275e1183020ebd60707a360f66106eaf1856716f64d24ff06b0fd2ad1e29f12019e7d68bf00dc9cbe3a7afc1b

  • memory/3940-15-0x00007FF995B40000-0x00007FF996601000-memory.dmp

    Filesize

    10.8MB

  • memory/3940-18-0x000001F527400000-0x000001F5276A4000-memory.dmp

    Filesize

    2.6MB

  • memory/3940-27-0x00007FF995B40000-0x00007FF996601000-memory.dmp

    Filesize

    10.8MB

  • memory/4972-23-0x0000000000530000-0x000000000058E000-memory.dmp

    Filesize

    376KB

  • memory/4972-29-0x0000000000530000-0x000000000058E000-memory.dmp

    Filesize

    376KB

  • memory/4996-0-0x00007FF995B43000-0x00007FF995B45000-memory.dmp

    Filesize

    8KB

  • memory/4996-1-0x0000000000830000-0x0000000000B48000-memory.dmp

    Filesize

    3.1MB

  • memory/4996-10-0x00007FF995B40000-0x00007FF996601000-memory.dmp

    Filesize

    10.8MB

  • memory/4996-26-0x00007FF995B40000-0x00007FF996601000-memory.dmp

    Filesize

    10.8MB