Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 02:10

General

  • Target

    34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe

  • Size

    1.1MB

  • MD5

    a2e9824e77be1fbc29913ffd0b324823

  • SHA1

    42dd1e05ec49639d9d8ad318e732a66a1451fd6f

  • SHA256

    34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197

  • SHA512

    d42a7f8c2d032a46dd664e6941c3496359ecc865d7a5394c782ecfd66fbd17b9bfefa1671068c869803c99cb9e00553242286c71b180341e003299d64ff4ed8c

  • SSDEEP

    24576:eAp1czyvnORvabmyJFMwOQ75wWkGR+1FaFEddGuL9NfSvtzH:lczyvORiRJxwJ1FYxG2lzH

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://goldyhanders.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe
    "C:\Users\Admin\AppData\Local\Temp\34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Unexpected Unexpected.cmd & Unexpected.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2640
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2552
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2452
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2592
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 224553
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2532
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Choosing
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2412
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Readily" Departure
        3⤵
        • System Location Discovery: System Language Discovery
        PID:660
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 224553\Luther.com + Remote + Priorities + Cho + Reliability + Rating + Dot + Holocaust + Page + Webshots 224553\Luther.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2628
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Crowd + ..\Leone + ..\Tutorial + ..\Architect + ..\Mutual + ..\Margin + ..\Many z
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2880
      • C:\Users\Admin\AppData\Local\Temp\224553\Luther.com
        Luther.com z
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1976
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\224553\Luther.com

    Filesize

    1001B

    MD5

    2d74dd690b587463fb169aa954177191

    SHA1

    38e1d4a4d6d27989eb66c7dab5d35107b549aee6

    SHA256

    548483df9a2c749dcf0b33585117e3316fc9286173c94da720afdf8faf2fbda6

    SHA512

    1f11fd88bbabdba5aeb83cfba4a4d94a5b6efdbce6d32937547b6385528dbafe59c0fffd2e908df7f7b17bc97aa2e7f6b3fb65c502a795917b0038872eb70fc5

  • C:\Users\Admin\AppData\Local\Temp\224553\z

    Filesize

    474KB

    MD5

    33f702c6f174718d817b4605ed89b52f

    SHA1

    f5649e94bfa880c7aa8d2ebcc27cbbcf44901223

    SHA256

    1021afdcac174ac0bfeb373b28c4658b5dc7671fcd2f7301edb10746eaf4f333

    SHA512

    d6dabdacb753c46bb6d9043df7f02676f8ec5221742b5e861e62436bece904f92214498c5e3eecb0974cb47229a7356101c936b0acc26edc907d150efb01d1e5

  • C:\Users\Admin\AppData\Local\Temp\Architect

    Filesize

    52KB

    MD5

    af3ff719c0edacf7c2ac90c6259b85c4

    SHA1

    3df4efc47089e1dcc211bf19459c228fc36abf74

    SHA256

    97ae833cc88a6444656556032ad9d2ec0351233b41c5ec74a2d49341eeffa1b6

    SHA512

    2368493619e85c862997179945cecfcb4f824ba85b5b7e3b7278b6974edacfe9a95960bab8f436ea6e380965b3ee1be6c6fc3b274b42bed7200726fcf5d593d8

  • C:\Users\Admin\AppData\Local\Temp\Cab32B6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Cho

    Filesize

    88KB

    MD5

    5fa589ca1812f594c0773aea5adaa1af

    SHA1

    d7e9b77324d0da50b2d3b253fe57ada8100e2dd9

    SHA256

    43f6fa8cd5131cdb725ae40bc9643a0126c9ff356333d757e6ab105e1274cfb2

    SHA512

    490a3dab1f7a50e7da3dcea5bb39af7ced6326caee9d332f12b4f0ded6a235e612c53ab3fa2a7695c83630c5f8252a3e86140f3c6dedddb7912e228dabc9735d

  • C:\Users\Admin\AppData\Local\Temp\Choosing

    Filesize

    477KB

    MD5

    72c5f20b52aeca0923566a34b9133cf2

    SHA1

    7832a2b158078e5bf463f54e54d6538fb340b6f0

    SHA256

    87aa8213c3409de46457a2fdbb278ff529caac10391f36687617fa149406b5ea

    SHA512

    2f0f8231c1a90d91db5701ebc57941b673f036b859607b22815e372613a348e1c3ea46ec10f785f77f091612c987dd3a6cb7ba6f2b922c640cb4d099d1510455

  • C:\Users\Admin\AppData\Local\Temp\Crowd

    Filesize

    94KB

    MD5

    e6391427848508dc0ac92258cc6fd6af

    SHA1

    6722e7bcf38c1c2013499f725850abcbcdc06007

    SHA256

    65e9e6bfccd8ab7acac8e56e74410059512477c47dff1acbcaba22f3611ebd06

    SHA512

    0ff1ed8d2f55169991c20f9884e97d73d91b24639c0e1813d4f2c5c1231904f5d829a567a2bc88a869fb9f544b16844f439947cbad5573b28e3e30662cc93260

  • C:\Users\Admin\AppData\Local\Temp\Departure

    Filesize

    1008B

    MD5

    f5189566c9c39e1c2d0d72e8c10b8b79

    SHA1

    c59598a96aa3b5939d663fd80fbd591ee3291929

    SHA256

    1abe59bf2eccf033889f006f7e47709ec38d5e36e795dc959e68ad60a1c1425a

    SHA512

    353580a4b7d04d7fc6aaf5df3cb9d84aaf39264e371263f1fac6e1680a863bc42757658171c36fd84e19eb555f2eaff1596511e0af1dc62d1de7358fc793befb

  • C:\Users\Admin\AppData\Local\Temp\Dot

    Filesize

    83KB

    MD5

    bc5a5c27bbda4f3ee9d4df841ee733b1

    SHA1

    f5b47462614d2ba38709dc5e59860b2dffb4535a

    SHA256

    f232b85dbcfa04e0bf3881a1693f6d5a79031cde17c56cb819c94b844d61e8b9

    SHA512

    ad399cab38073200fa32b809eb25d7bf7576ffc23275ade88f4b72dca544f87e72ef02f24e608f51263154386e38c6ce48de9693332a61e02a030b8d7e667aad

  • C:\Users\Admin\AppData\Local\Temp\Holocaust

    Filesize

    132KB

    MD5

    7ebb69fb1e465b4d1c8e467ab5e583e0

    SHA1

    27ded234ec9e48f32738f6dcc15e2a34fb34455e

    SHA256

    82653165cc91bc33c0120101dc443294cbcdcdf02d19111ef906e5f00efad565

    SHA512

    c85781a91b3cd7ef626350bf50618043896fcec372624ccb900e9500b56dcd80deabd6a3a8b81bad558ab7ce5e3c87fd51f790893a63cd20ca8b153299b899a6

  • C:\Users\Admin\AppData\Local\Temp\Leone

    Filesize

    54KB

    MD5

    4cfe724fa55d354c9807368c7d6eef37

    SHA1

    6b7b271980fda4c942290a4e58625a4173c2719d

    SHA256

    cb198967c45747c5e6a2fd5c92ff5b13e4c10d4f7dc443b394601c8db65b8b71

    SHA512

    71daf1fb12364cc73d73b44ef5b63d7ac749fd2eacc36c53d3f47a4e7bcfcceacb50d85db14e67fba403e97f922bc43f03e1817c4fca00f945cf36c667f19892

  • C:\Users\Admin\AppData\Local\Temp\Many

    Filesize

    40KB

    MD5

    3510bf64cfa6df3631d880db920b568f

    SHA1

    397bb3156970d85919c7eea0559fcf55c4f42046

    SHA256

    d6b86d8d46d73f3df05a804615985008646dd078ecc4bb753b34c0026cab4473

    SHA512

    eb2826fc3036cf81b2517389bafc6960700a8c5aa5d0f6f6532e20ca983d3b621f96b479dd5ef6fe12fc78b895e2f862a2704f1514d88913c70d6a483f7a6b55

  • C:\Users\Admin\AppData\Local\Temp\Margin

    Filesize

    80KB

    MD5

    edad8ba829ce461df73b1c45419d06f7

    SHA1

    e5b34951d4bb4ad311413b0cf6075d6c70ae1d61

    SHA256

    2e5ffe7355a711ded6e0a037f2fd1eec67dd52d48a83117e7c35827c2c7af2c0

    SHA512

    1d9f069336f56434c9343f1a54d0391f5d8b273ac22a0c5713ff8645a8a828eb5b56b3d0b1a10da9f1e394527b421df31171691c57fc893f5649cfe5ff040e35

  • C:\Users\Admin\AppData\Local\Temp\Mutual

    Filesize

    90KB

    MD5

    d6bdaae9e013495c5fb5e97f1203009a

    SHA1

    e4603f73d1289c0da115e8d7f95d7c78caca232e

    SHA256

    ceeaa6ad552ba0189f32c51153c882a9772e6fc3d7d1d9a632106348840fabde

    SHA512

    ce5e9a2f6e63abc12d32d2cc88203b73c2b968d485701749ea8fa9c762794ab7059f396daa3e78aa2b238d1feccc0be929198cbff79a46ebc17f71405c066bb2

  • C:\Users\Admin\AppData\Local\Temp\Page

    Filesize

    142KB

    MD5

    849da478ec3b54458595ebc4797f5a03

    SHA1

    c88aa82b39fb85d77801370b5dca64a01cef7293

    SHA256

    9f080e2cb1c50c9646279cb6943bbf35016e61c89f5437ebfe32466109aaa291

    SHA512

    bfeabd47308f352a5fabaa04e443a7d6a7a7e94f99d443e6b01d229d6df2b6d718c3651fa115405eba8d1cc22b2d0003f4b6f25aac631ef4f662d1dbe89451db

  • C:\Users\Admin\AppData\Local\Temp\Priorities

    Filesize

    67KB

    MD5

    b212537407fe3aea1f37210f2c97fb34

    SHA1

    46029a7bd80781bf385138ec72a3aa0017b63119

    SHA256

    0f88efbb006b3b8924cb853643f944c7d1bc0e16162a8c9bb82483e8d65a4306

    SHA512

    9d314912490b65f2933967a3350a42fd7b378aca42d7449f05b0c1d1e9cbd79601c9939e71445ad918054314d02fe43ced13e0aa3b60953653751d53ee76a8fc

  • C:\Users\Admin\AppData\Local\Temp\Rating

    Filesize

    134KB

    MD5

    5ed11c4b626451b04c76471c60785363

    SHA1

    1fa1bed97199f5366176a4f3e61552323102acae

    SHA256

    2601fbcbc756e49dd60f311b322bf80a6f1c7f4137c263097c5bf67162433ae2

    SHA512

    2d0d5193e7bee25ddd703bf59f6753838a279e72bca8eb64ff384b0d94221015152631a0ea3bf8f8881140febf389c27769040a212eda2326925dbc9cee88ad4

  • C:\Users\Admin\AppData\Local\Temp\Reliability

    Filesize

    126KB

    MD5

    1bf9441983742c8780ab9cbea7cecd89

    SHA1

    43d35ec6eac2236590a4e1cafe9561c55e56d010

    SHA256

    ae0bdb2202869d1b4a823af93eeb97e1a6a2a0c2d44dfaf91f690bacc1b33ddd

    SHA512

    2dd2a71b448da383aefc47b0127752bd17246993d5149298248e9ea2b052e24e49d1a6303dd14632388fb7235d11ffbaedc0793f4ec96df19f24f9e8173a7c42

  • C:\Users\Admin\AppData\Local\Temp\Remote

    Filesize

    80KB

    MD5

    ae602f582ec8b5d0d56cc531d658df4b

    SHA1

    85d748ae045139b463146c412436e4b95d03b350

    SHA256

    ca490cca0a853ed6f00f791a65e61aa478154968259b06e8d6ceeda76d006d67

    SHA512

    19a05a40539685a1eb1346476337e0e0a8d44128a609f94551e070f82c5051abf1a93e978a573d1bfda2f2627adce7bb747e849cf0e8221b52e0b54bd9ac4775

  • C:\Users\Admin\AppData\Local\Temp\Tar32C9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Tutorial

    Filesize

    64KB

    MD5

    36da83a9b17eb16afcab4fce116634ba

    SHA1

    e5f806ce81683a7b12d6afcb900a440224c3ffba

    SHA256

    eaf7f69ed7cc6190d37788a127613ec90d3f9ad822b1f913e90cbf1b32613a6e

    SHA512

    250a6d82f1d2488808fed88f23cd83f6c45504b190cb5606df6fec628c9667357d2a850ed4631c6a9090b9105dd6646930552cfdc0437c2164b1e5439144b0f4

  • C:\Users\Admin\AppData\Local\Temp\Unexpected

    Filesize

    15KB

    MD5

    63515f866844b279cef96864cb3348c0

    SHA1

    2276f6b26044eb3ff252fab4ece7a52b47b1e37c

    SHA256

    56331384e114b80d7f259411ef2b64c412206b5ad0680321f15387e37472cc7c

    SHA512

    e3df3cc2e447538009851f233c74fb54f51c3462647090824cc63043b872d3bb545aab11e65288681811a1346d34a3a7fa72a0a5e3df5857b59babb7a2846630

  • C:\Users\Admin\AppData\Local\Temp\Webshots

    Filesize

    72KB

    MD5

    ba4bd6472d1f50ff03bebbbaae89b22c

    SHA1

    29db7366a8db226219c1de45d2b7df6265730331

    SHA256

    0ebc95d7954aba8429745ed50884cd0629673be34386aa7c0cbac5a9a5b7aa02

    SHA512

    943b54aca2d2ac1400a21eeda356a34fcc1c85f93a3716423d169ffa0693bb7eb61fe4b0a4f99becd8aee7f944a3e4840542464788d87aeb8acff93fcbc43037

  • \Users\Admin\AppData\Local\Temp\224553\Luther.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1976-67-0x0000000003A30000-0x0000000003A85000-memory.dmp

    Filesize

    340KB

  • memory/1976-68-0x0000000003A30000-0x0000000003A85000-memory.dmp

    Filesize

    340KB

  • memory/1976-69-0x0000000003A30000-0x0000000003A85000-memory.dmp

    Filesize

    340KB

  • memory/1976-70-0x0000000003A30000-0x0000000003A85000-memory.dmp

    Filesize

    340KB

  • memory/1976-71-0x0000000003A30000-0x0000000003A85000-memory.dmp

    Filesize

    340KB