Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 02:10
Static task
static1
Behavioral task
behavioral1
Sample
34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe
Resource
win7-20240903-en
General
-
Target
34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe
-
Size
1.1MB
-
MD5
a2e9824e77be1fbc29913ffd0b324823
-
SHA1
42dd1e05ec49639d9d8ad318e732a66a1451fd6f
-
SHA256
34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197
-
SHA512
d42a7f8c2d032a46dd664e6941c3496359ecc865d7a5394c782ecfd66fbd17b9bfefa1671068c869803c99cb9e00553242286c71b180341e003299d64ff4ed8c
-
SSDEEP
24576:eAp1czyvnORvabmyJFMwOQ75wWkGR+1FaFEddGuL9NfSvtzH:lczyvORiRJxwJ1FYxG2lzH
Malware Config
Extracted
lumma
https://goldyhanders.cyou/api
Signatures
-
Lumma family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe -
Executes dropped EXE 1 IoCs
pid Process 4872 Luther.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1012 tasklist.exe 4324 tasklist.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\MonoQuery 34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe File opened for modification C:\Windows\CorrespondenceSerbia 34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe File opened for modification C:\Windows\OverNodes 34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Luther.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4872 Luther.com 4872 Luther.com 4872 Luther.com 4872 Luther.com 4872 Luther.com 4872 Luther.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4324 tasklist.exe Token: SeDebugPrivilege 1012 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4872 Luther.com 4872 Luther.com 4872 Luther.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4872 Luther.com 4872 Luther.com 4872 Luther.com -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3916 wrote to memory of 3324 3916 34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe 82 PID 3916 wrote to memory of 3324 3916 34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe 82 PID 3916 wrote to memory of 3324 3916 34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe 82 PID 3324 wrote to memory of 4324 3324 cmd.exe 84 PID 3324 wrote to memory of 4324 3324 cmd.exe 84 PID 3324 wrote to memory of 4324 3324 cmd.exe 84 PID 3324 wrote to memory of 1300 3324 cmd.exe 85 PID 3324 wrote to memory of 1300 3324 cmd.exe 85 PID 3324 wrote to memory of 1300 3324 cmd.exe 85 PID 3324 wrote to memory of 1012 3324 cmd.exe 87 PID 3324 wrote to memory of 1012 3324 cmd.exe 87 PID 3324 wrote to memory of 1012 3324 cmd.exe 87 PID 3324 wrote to memory of 1068 3324 cmd.exe 88 PID 3324 wrote to memory of 1068 3324 cmd.exe 88 PID 3324 wrote to memory of 1068 3324 cmd.exe 88 PID 3324 wrote to memory of 1844 3324 cmd.exe 89 PID 3324 wrote to memory of 1844 3324 cmd.exe 89 PID 3324 wrote to memory of 1844 3324 cmd.exe 89 PID 3324 wrote to memory of 4504 3324 cmd.exe 90 PID 3324 wrote to memory of 4504 3324 cmd.exe 90 PID 3324 wrote to memory of 4504 3324 cmd.exe 90 PID 3324 wrote to memory of 3232 3324 cmd.exe 91 PID 3324 wrote to memory of 3232 3324 cmd.exe 91 PID 3324 wrote to memory of 3232 3324 cmd.exe 91 PID 3324 wrote to memory of 4076 3324 cmd.exe 92 PID 3324 wrote to memory of 4076 3324 cmd.exe 92 PID 3324 wrote to memory of 4076 3324 cmd.exe 92 PID 3324 wrote to memory of 3548 3324 cmd.exe 93 PID 3324 wrote to memory of 3548 3324 cmd.exe 93 PID 3324 wrote to memory of 3548 3324 cmd.exe 93 PID 3324 wrote to memory of 4872 3324 cmd.exe 94 PID 3324 wrote to memory of 4872 3324 cmd.exe 94 PID 3324 wrote to memory of 4872 3324 cmd.exe 94 PID 3324 wrote to memory of 5112 3324 cmd.exe 95 PID 3324 wrote to memory of 5112 3324 cmd.exe 95 PID 3324 wrote to memory of 5112 3324 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe"C:\Users\Admin\AppData\Local\Temp\34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Unexpected Unexpected.cmd & Unexpected.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:1068
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2245533⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Choosing3⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Readily" Departure3⤵
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 224553\Luther.com + Remote + Priorities + Cho + Reliability + Rating + Dot + Holocaust + Page + Webshots 224553\Luther.com3⤵
- System Location Discovery: System Language Discovery
PID:4076
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Crowd + ..\Leone + ..\Tutorial + ..\Architect + ..\Mutual + ..\Margin + ..\Many z3⤵
- System Location Discovery: System Language Discovery
PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\224553\Luther.comLuther.com z3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4872
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD50e6a5cc880100ba1ef33eb2e376e9b76
SHA11227428c798a1e9feb7ecbbc35ae4c7e00a85569
SHA25614b16c15f9c0dcd10615805faa5f34ce98bc2e488d666af6e2fd6171050891a6
SHA512c63c0bcee2724874b95600bfc49a7913379c9740f57291c6c2774eb4f5a4c3dad82f53fed00a286118c5a949a44ccf06e80e400c0c314de45f3d97b3f958d593
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
474KB
MD533f702c6f174718d817b4605ed89b52f
SHA1f5649e94bfa880c7aa8d2ebcc27cbbcf44901223
SHA2561021afdcac174ac0bfeb373b28c4658b5dc7671fcd2f7301edb10746eaf4f333
SHA512d6dabdacb753c46bb6d9043df7f02676f8ec5221742b5e861e62436bece904f92214498c5e3eecb0974cb47229a7356101c936b0acc26edc907d150efb01d1e5
-
Filesize
52KB
MD5af3ff719c0edacf7c2ac90c6259b85c4
SHA13df4efc47089e1dcc211bf19459c228fc36abf74
SHA25697ae833cc88a6444656556032ad9d2ec0351233b41c5ec74a2d49341eeffa1b6
SHA5122368493619e85c862997179945cecfcb4f824ba85b5b7e3b7278b6974edacfe9a95960bab8f436ea6e380965b3ee1be6c6fc3b274b42bed7200726fcf5d593d8
-
Filesize
88KB
MD55fa589ca1812f594c0773aea5adaa1af
SHA1d7e9b77324d0da50b2d3b253fe57ada8100e2dd9
SHA25643f6fa8cd5131cdb725ae40bc9643a0126c9ff356333d757e6ab105e1274cfb2
SHA512490a3dab1f7a50e7da3dcea5bb39af7ced6326caee9d332f12b4f0ded6a235e612c53ab3fa2a7695c83630c5f8252a3e86140f3c6dedddb7912e228dabc9735d
-
Filesize
477KB
MD572c5f20b52aeca0923566a34b9133cf2
SHA17832a2b158078e5bf463f54e54d6538fb340b6f0
SHA25687aa8213c3409de46457a2fdbb278ff529caac10391f36687617fa149406b5ea
SHA5122f0f8231c1a90d91db5701ebc57941b673f036b859607b22815e372613a348e1c3ea46ec10f785f77f091612c987dd3a6cb7ba6f2b922c640cb4d099d1510455
-
Filesize
94KB
MD5e6391427848508dc0ac92258cc6fd6af
SHA16722e7bcf38c1c2013499f725850abcbcdc06007
SHA25665e9e6bfccd8ab7acac8e56e74410059512477c47dff1acbcaba22f3611ebd06
SHA5120ff1ed8d2f55169991c20f9884e97d73d91b24639c0e1813d4f2c5c1231904f5d829a567a2bc88a869fb9f544b16844f439947cbad5573b28e3e30662cc93260
-
Filesize
1008B
MD5f5189566c9c39e1c2d0d72e8c10b8b79
SHA1c59598a96aa3b5939d663fd80fbd591ee3291929
SHA2561abe59bf2eccf033889f006f7e47709ec38d5e36e795dc959e68ad60a1c1425a
SHA512353580a4b7d04d7fc6aaf5df3cb9d84aaf39264e371263f1fac6e1680a863bc42757658171c36fd84e19eb555f2eaff1596511e0af1dc62d1de7358fc793befb
-
Filesize
83KB
MD5bc5a5c27bbda4f3ee9d4df841ee733b1
SHA1f5b47462614d2ba38709dc5e59860b2dffb4535a
SHA256f232b85dbcfa04e0bf3881a1693f6d5a79031cde17c56cb819c94b844d61e8b9
SHA512ad399cab38073200fa32b809eb25d7bf7576ffc23275ade88f4b72dca544f87e72ef02f24e608f51263154386e38c6ce48de9693332a61e02a030b8d7e667aad
-
Filesize
132KB
MD57ebb69fb1e465b4d1c8e467ab5e583e0
SHA127ded234ec9e48f32738f6dcc15e2a34fb34455e
SHA25682653165cc91bc33c0120101dc443294cbcdcdf02d19111ef906e5f00efad565
SHA512c85781a91b3cd7ef626350bf50618043896fcec372624ccb900e9500b56dcd80deabd6a3a8b81bad558ab7ce5e3c87fd51f790893a63cd20ca8b153299b899a6
-
Filesize
54KB
MD54cfe724fa55d354c9807368c7d6eef37
SHA16b7b271980fda4c942290a4e58625a4173c2719d
SHA256cb198967c45747c5e6a2fd5c92ff5b13e4c10d4f7dc443b394601c8db65b8b71
SHA51271daf1fb12364cc73d73b44ef5b63d7ac749fd2eacc36c53d3f47a4e7bcfcceacb50d85db14e67fba403e97f922bc43f03e1817c4fca00f945cf36c667f19892
-
Filesize
40KB
MD53510bf64cfa6df3631d880db920b568f
SHA1397bb3156970d85919c7eea0559fcf55c4f42046
SHA256d6b86d8d46d73f3df05a804615985008646dd078ecc4bb753b34c0026cab4473
SHA512eb2826fc3036cf81b2517389bafc6960700a8c5aa5d0f6f6532e20ca983d3b621f96b479dd5ef6fe12fc78b895e2f862a2704f1514d88913c70d6a483f7a6b55
-
Filesize
80KB
MD5edad8ba829ce461df73b1c45419d06f7
SHA1e5b34951d4bb4ad311413b0cf6075d6c70ae1d61
SHA2562e5ffe7355a711ded6e0a037f2fd1eec67dd52d48a83117e7c35827c2c7af2c0
SHA5121d9f069336f56434c9343f1a54d0391f5d8b273ac22a0c5713ff8645a8a828eb5b56b3d0b1a10da9f1e394527b421df31171691c57fc893f5649cfe5ff040e35
-
Filesize
90KB
MD5d6bdaae9e013495c5fb5e97f1203009a
SHA1e4603f73d1289c0da115e8d7f95d7c78caca232e
SHA256ceeaa6ad552ba0189f32c51153c882a9772e6fc3d7d1d9a632106348840fabde
SHA512ce5e9a2f6e63abc12d32d2cc88203b73c2b968d485701749ea8fa9c762794ab7059f396daa3e78aa2b238d1feccc0be929198cbff79a46ebc17f71405c066bb2
-
Filesize
142KB
MD5849da478ec3b54458595ebc4797f5a03
SHA1c88aa82b39fb85d77801370b5dca64a01cef7293
SHA2569f080e2cb1c50c9646279cb6943bbf35016e61c89f5437ebfe32466109aaa291
SHA512bfeabd47308f352a5fabaa04e443a7d6a7a7e94f99d443e6b01d229d6df2b6d718c3651fa115405eba8d1cc22b2d0003f4b6f25aac631ef4f662d1dbe89451db
-
Filesize
67KB
MD5b212537407fe3aea1f37210f2c97fb34
SHA146029a7bd80781bf385138ec72a3aa0017b63119
SHA2560f88efbb006b3b8924cb853643f944c7d1bc0e16162a8c9bb82483e8d65a4306
SHA5129d314912490b65f2933967a3350a42fd7b378aca42d7449f05b0c1d1e9cbd79601c9939e71445ad918054314d02fe43ced13e0aa3b60953653751d53ee76a8fc
-
Filesize
134KB
MD55ed11c4b626451b04c76471c60785363
SHA11fa1bed97199f5366176a4f3e61552323102acae
SHA2562601fbcbc756e49dd60f311b322bf80a6f1c7f4137c263097c5bf67162433ae2
SHA5122d0d5193e7bee25ddd703bf59f6753838a279e72bca8eb64ff384b0d94221015152631a0ea3bf8f8881140febf389c27769040a212eda2326925dbc9cee88ad4
-
Filesize
126KB
MD51bf9441983742c8780ab9cbea7cecd89
SHA143d35ec6eac2236590a4e1cafe9561c55e56d010
SHA256ae0bdb2202869d1b4a823af93eeb97e1a6a2a0c2d44dfaf91f690bacc1b33ddd
SHA5122dd2a71b448da383aefc47b0127752bd17246993d5149298248e9ea2b052e24e49d1a6303dd14632388fb7235d11ffbaedc0793f4ec96df19f24f9e8173a7c42
-
Filesize
80KB
MD5ae602f582ec8b5d0d56cc531d658df4b
SHA185d748ae045139b463146c412436e4b95d03b350
SHA256ca490cca0a853ed6f00f791a65e61aa478154968259b06e8d6ceeda76d006d67
SHA51219a05a40539685a1eb1346476337e0e0a8d44128a609f94551e070f82c5051abf1a93e978a573d1bfda2f2627adce7bb747e849cf0e8221b52e0b54bd9ac4775
-
Filesize
64KB
MD536da83a9b17eb16afcab4fce116634ba
SHA1e5f806ce81683a7b12d6afcb900a440224c3ffba
SHA256eaf7f69ed7cc6190d37788a127613ec90d3f9ad822b1f913e90cbf1b32613a6e
SHA512250a6d82f1d2488808fed88f23cd83f6c45504b190cb5606df6fec628c9667357d2a850ed4631c6a9090b9105dd6646930552cfdc0437c2164b1e5439144b0f4
-
Filesize
15KB
MD563515f866844b279cef96864cb3348c0
SHA12276f6b26044eb3ff252fab4ece7a52b47b1e37c
SHA25656331384e114b80d7f259411ef2b64c412206b5ad0680321f15387e37472cc7c
SHA512e3df3cc2e447538009851f233c74fb54f51c3462647090824cc63043b872d3bb545aab11e65288681811a1346d34a3a7fa72a0a5e3df5857b59babb7a2846630
-
Filesize
72KB
MD5ba4bd6472d1f50ff03bebbbaae89b22c
SHA129db7366a8db226219c1de45d2b7df6265730331
SHA2560ebc95d7954aba8429745ed50884cd0629673be34386aa7c0cbac5a9a5b7aa02
SHA512943b54aca2d2ac1400a21eeda356a34fcc1c85f93a3716423d169ffa0693bb7eb61fe4b0a4f99becd8aee7f944a3e4840542464788d87aeb8acff93fcbc43037