Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 06:27

General

  • Target

    #Pa$$w0rD__5567--0peɴ_Set-Up#$.zip

  • Size

    10.8MB

  • MD5

    f96202a20dbbe93131fb1f3035013507

  • SHA1

    a312d5e8ab3adedc14fac3f0c2c6618fb01bf833

  • SHA256

    a50393843e9cd5fc754098377b78af3ad3f4731ebb79830bb0edb56ca3dbece5

  • SHA512

    49bd11d3d256036ebd0448415d539b7024e9219867817bd10bb33ac4e7a22b769c916b50b104ac38971bf98f57da4a1c319a15023d5534e798e69acec8044479

  • SSDEEP

    196608:azcw72+hAscuMLLMu9ia2P4A+DkF/SjLpMj1syona9ryk5WRZajMkCm0ZvcAOTSP:a4wphA9Rpia3A+Do/SjLGjrQa9ry0+S6

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://kitealivejz.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\#Pa$$w0rD__5567--0peɴ_Set-Up#$.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\7zOC8A40D77\Set-up.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOC8A40D77\Set-up.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c move Oscar Oscar.cmd & Oscar.cmd
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2196
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1932
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:316
        • C:\Windows\SysWOW64\findstr.exe
          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1584
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 311792
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1676
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Volvo
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1688
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "Driven" Poverty
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2032
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 311792\Modify.com + Amended + Coordinates + Magic + Easier + Seo + Ease + Carefully + Simple + Explanation + Edmonton 311792\Modify.com
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2828
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Consider + ..\Brain + ..\Prev + ..\Vessel + ..\Currency + ..\Companion + ..\Certified u
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1740
        • C:\Users\Admin\AppData\Local\Temp\311792\Modify.com
          Modify.com u
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1904
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\311792\Modify.com

    Filesize

    233KB

    MD5

    2b4ffc51e6fc05b2adae2a4495b63128

    SHA1

    fdf0d9bbe590c77d208fc7c7bd9f0af6eb6a183f

    SHA256

    c8866c021f3a5e13050aa6177c69104feb4fa33a7f6714b5bcdebafa7c2b75b2

    SHA512

    d67d5b76d0ff553ed964e9ef3426208f1855854a537a52d1651868452fdef61799ed12468dc1abe08b62ec71bb40b8e69df59db2b9b823602ee5e4c5559a0e93

  • C:\Users\Admin\AppData\Local\Temp\311792\u

    Filesize

    494KB

    MD5

    4fc5c59d19920eb7dfe697b6440545ad

    SHA1

    4640e9d429a3eae7d3bf1f319966630a9277b90c

    SHA256

    0bf677014e8e8e51cae745916bc8c63f21e12756540977678eca2ea5d6e5c624

    SHA512

    bdc6a74134b0ece8051d9a16849d598d15a63ec8f0d0b4777674069522e3aaa6d6bce87d2741a741436a5bef799b9cfa60c5ad3cf223af992f0d254a7a5f8c16

  • C:\Users\Admin\AppData\Local\Temp\Amended

    Filesize

    104KB

    MD5

    6d0214f6912a3dc4893810de5e1e60f5

    SHA1

    a7724c5133b3543ebdae870ade681e608cf61931

    SHA256

    5fba8e2fabcbda7287f7d3bc1f6f1a5635ac8b7cd879344aa7b1b2f3d36de4ae

    SHA512

    9f83abcff70533fe7c312ba34dc528758201492ddafeda2ae8eb0250fec602d87bac9177d1c03224f230fbe068c61cc2f3b16f11ac4e67d9bcbf28ea862ae5ed

  • C:\Users\Admin\AppData\Local\Temp\Brain

    Filesize

    60KB

    MD5

    63d96740f27c00c9024d46cd6465dcf1

    SHA1

    2d24a6e644640ce667d6fd4cd987f6cc288d309b

    SHA256

    d6bd3fc284c074ece468da3c6e94d79ebf0b5b24463c5a345a0709b759961e5c

    SHA512

    430339299734e3f2d2ff8159c9cec362ea25a3c5f8de35cc378e70dffd77ebecead9e20f9e8f8e91a318b1ae052726a55c5b08878c79caac9d27aec9ee248c3f

  • C:\Users\Admin\AppData\Local\Temp\CabC2E4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Carefully

    Filesize

    84KB

    MD5

    16b52cdbf9086ef3ea21279a6a45af2c

    SHA1

    d76a12c9c9bf7d775c2c5947c209e3aa1e198e69

    SHA256

    4e8b7f6e94707cc1fa688c37941d98e6da9ec8ebbc51a25d0ad62f1fcd35ec79

    SHA512

    58be45de4ec94ff17899dbc303348a26d92b8d89829c845b910a6c66561bb7c7d1cddb1d5a49cf93ba6d31fe486db8af6fc1b8221f219067fd7069e41bd8601a

  • C:\Users\Admin\AppData\Local\Temp\Certified

    Filesize

    34KB

    MD5

    2b3077069eeea833dd6a1c774b935fec

    SHA1

    eb13f0e4a5072f52e7a9df844105e25b94c602e9

    SHA256

    c69f337738f450a598fe6de9e2bd155b8ec4490f171d5f9fa2520048167bc719

    SHA512

    3c56ba627e6260b5d0c04b3985b76652bc66ba21555ed5f5ee9d9a4d1d922a1ddd29aa29c5f84607f210294fbb92d1ba670317c9ec98600576c20f69b8037f30

  • C:\Users\Admin\AppData\Local\Temp\Companion

    Filesize

    90KB

    MD5

    e0626e80e7d7f7cc1900a9873641f0fb

    SHA1

    c470b4c63b18b6606adad898c1225aa024608f34

    SHA256

    91788454bf6fc411fbef18eab3db9480a6b8c3688160e404e7fabc69de31f69d

    SHA512

    e7e868ff0a6aa078e855da77e65d12b19adb6300ec6a1d53db3401f2f665af965a6269031dbf7edf7acabdc1557d331e66b48ee3571315610c2bd60de7a6d846

  • C:\Users\Admin\AppData\Local\Temp\Consider

    Filesize

    95KB

    MD5

    4365be528d2cb862a4a7dd41710cfa7d

    SHA1

    bf55a3af5f89cfb3660362ca22160a8f3ca9c75e

    SHA256

    92f37dc3be522139ca4c67f7d6298e628a605d46a4422020870d594b8c02df80

    SHA512

    7503c4737bd17aa7d28dbd00e2aeeb6ce55c30a7e6e6aab0ff91a598dc5dc986f911e09a10f6674068247e3dc2cf2b20ee9edb8732f0f5211dd8191eed29a4b8

  • C:\Users\Admin\AppData\Local\Temp\Coordinates

    Filesize

    128KB

    MD5

    9b058113b25c5da7af9e59a93308a73f

    SHA1

    c193a0ac444c68272593ea6dbe9f39cd9f92af04

    SHA256

    da4813aba5a45a3934110de4adc8b30d0411fcfaaeb1b0fb494bcde56ae209b6

    SHA512

    5d621ab6c15aaa41eddb07b7693f834048be96d7ee7ebdcf01c8f3dafacb161fdb7a1ea527fc8330c051657d8481fcd21f24cba90d75fb9ad1e9142d885940e6

  • C:\Users\Admin\AppData\Local\Temp\Currency

    Filesize

    73KB

    MD5

    78cda3b9b0a10a84e09a68385ddbdff9

    SHA1

    ce2e7fc0d6db0c23e878d147583f6a96454df64f

    SHA256

    f98925ec3aa6af90d2f3d7af1004c0f694cefa69a930e28ad9a23078fce2509f

    SHA512

    030eba3ae7f2abe46b479b7005ad60c8e31f6eaa05ecc471f13f34f3771ac07dc1cc60ef03872a71b669e26d8a18971e76b5a0ef96a43534f5810bb5ac72e28e

  • C:\Users\Admin\AppData\Local\Temp\Ease

    Filesize

    101KB

    MD5

    5e800e43abc85001431d50d6eb6a18ed

    SHA1

    abf958739891275540a65ef6c26a6ca4352faf7d

    SHA256

    14964d44371ab61531d4422572eb6ee5b88b5b34cdf137a3853217ef744df4da

    SHA512

    2051998f528777ae78550600d1d27e72d9934d20813d5e202e6dafb355f02b7b2a92a8515b871db8eb79962f4c210b6a4a3c933eedaccb6ac89ad68419d20e5b

  • C:\Users\Admin\AppData\Local\Temp\Easier

    Filesize

    105KB

    MD5

    873b316d0d9a90e6d1a489142257154a

    SHA1

    bc755983177e5c8450937b2db523049a15bc88ce

    SHA256

    9e1bb20b826bfa74d143b81408435e61bb7926d8b8e8ad774dc04b6c7e3c84cc

    SHA512

    c5ea3e71382655500b4050310008c3855c416ff7a1dfd152f7a9a7ff6d8b6ce2025e2609acc8a5d8d5ba24c3c687ea7bb3151a81ff0d8de0c03f7e200de337c2

  • C:\Users\Admin\AppData\Local\Temp\Edmonton

    Filesize

    78KB

    MD5

    60ae82bb1582d6cee005ed9226ba4f8e

    SHA1

    95b006ad9f0f575d8bf080af02df2a081a854c77

    SHA256

    9d3c871d5e57f7aba17641c8d4d14a1b27aba24b7981fd8d89e689726b0ec1a1

    SHA512

    6a24504066034f7eb2984cb8c1bea0d2b824e7df1442a389841321cde1618e41441be0108273a8e9d250240c8cd8d7f81f753a0d8b7c48512046b9af44d0cacf

  • C:\Users\Admin\AppData\Local\Temp\Explanation

    Filesize

    108KB

    MD5

    783a540a4e174cc60f03d567afb1b681

    SHA1

    50d9b4839d3413dfb83cdd4541ad30eb268bd71b

    SHA256

    743e720e793d1f111d5b4f46da39623678d1fb8eb0bae57d51167de0c20464fe

    SHA512

    02a54eb0aac8ae67ca240d1be6626243ff9bb90fa91d6a93ac872337b0d398ecb67c7621a25deb252619c97c061b0edf87ae9d34f9c2b680046d5bbe8e2803c0

  • C:\Users\Admin\AppData\Local\Temp\Magic

    Filesize

    50KB

    MD5

    c4e2c0ab12cbc599788c667b6c037f64

    SHA1

    c710e78bc4e1dd60de7dd7ac07206353f9a9407d

    SHA256

    c47658ef67bc2e8c1d4945c41c1e96269c23848bc543fee6cb40f8381e585ab2

    SHA512

    a96de571c657a97b6cff5100d151c985e66aa9e210deb7a826fb91d5d2061caf2d46d615134612306cca3f9ff05c0776a4b65cb9d4116ffc642f2a32ccb314da

  • C:\Users\Admin\AppData\Local\Temp\Oscar

    Filesize

    33KB

    MD5

    0a714b81be3f1617a9ca42ac1ecfb6c6

    SHA1

    3588ec9f39a4b06705c7aa5191af3b9f8e255b47

    SHA256

    3f871a9e10e16cbb126f67599dad5601524ecf9dd49bd9f5fa0cb375c26a1e65

    SHA512

    a9a1ab4dcfb24ac93bbbf915d8fcda3faff77a8dce1dcda8d1e5dcc3e3f56c3e4918877d316844b373483b13b08f82768599c22b8e0ee562d28dfb165932e7a3

  • C:\Users\Admin\AppData\Local\Temp\Poverty

    Filesize

    1KB

    MD5

    003921b490d134f6f3503a046412a58a

    SHA1

    6431ecedf03ba179341970487efaefdc0c74c6bf

    SHA256

    3713ddeeb91c355579fbc247f24aa8126e135d211321336bf2cfff56fe50616d

    SHA512

    265b14f30b18fde29d4040ee34d0c857df0dd222155a2626fc7cabbe72d4cbb2360a4f7d1101e168a30cd1e1d965679897d2e6972f18ea0cc52fc96e822ef9f2

  • C:\Users\Admin\AppData\Local\Temp\Prev

    Filesize

    63KB

    MD5

    247fd942989a201d71af641b34afad83

    SHA1

    ee301da2f427c561c45b087aef12b74be53ecc0a

    SHA256

    58e1b564d06b0bd1dd4aba174bf0e9b6b772df009bc50992a14efb8d97a7966c

    SHA512

    7ae7fcdf778d4bdda12e294db0033cac9576f32bee0381741bc26873c53b195ec0825fce3695ab032eaed05006bb0026b984b12dab1da0c532dda0caa981623b

  • C:\Users\Admin\AppData\Local\Temp\Seo

    Filesize

    105KB

    MD5

    aa88fcd14d758bf0aa2fa4b09133c12e

    SHA1

    3b4a1a9676c0e53008f9e542677afddd2fae6f8c

    SHA256

    23ec34ddcfffca323431ee19548114026d4246ad678bb070026b9cdc004ff930

    SHA512

    c7e834e75df5d46148a52c2eb1f49f4d629ee972ac924a6b9ba5a2e2563a3a550b20b0d2dd278027835da512a9961ada8ff7c9492a8d6b0a68f398e9520e0251

  • C:\Users\Admin\AppData\Local\Temp\Simple

    Filesize

    60KB

    MD5

    9856e34fc486fe437b428b189640338d

    SHA1

    91dbeba69ba329de245ab1e505113cfae7ffbdb0

    SHA256

    995701481094c7afe4bdf572f9775d14721725a7ff7f4bd218e050a8d111fe3d

    SHA512

    1af08487d86daf989f3ff42535b922573830d1f45fd20b4e13c400438dee37bfb02fc28b2899524e26176d6c1d73bc3583c991229d90edb03a5dfc648d925b32

  • C:\Users\Admin\AppData\Local\Temp\TarC306.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Vessel

    Filesize

    79KB

    MD5

    9b409b7e069ac9d62c4b292611a6134a

    SHA1

    7caa633ba3655d75892eb033ae94f1b702a88c9c

    SHA256

    269bb700ad2e6a45265c8fd55a1f93cce24d894648a3bc7f70eb6960560d2028

    SHA512

    496652e9961667eda0f38989b741f74ee3b2f6b7987541ff56204a63b314e1ecbe91adf9127c475ab31ec77d23c2347f1b8b16f58cdf8797b67f5ff92516be9e

  • C:\Users\Admin\AppData\Local\Temp\Volvo

    Filesize

    477KB

    MD5

    e9e8bd079217b9d286393b062d873995

    SHA1

    cffea10d3237fd61e410ad7b34b2230b7688c237

    SHA256

    3794faeafcd0e040d467d5d40dbd407b7ec2763dedd2b96f956b58ba01d1c0e7

    SHA512

    4e0ac4c1d2293899affadc11355fe7d3aaacb2e35d42bd65ca1868b6e07497d1f162d2bf9b6618f03d3ad6d13ad6b84f178b63b70d7aa03257a28c31b8cd576d

  • \Users\Admin\AppData\Local\Temp\311792\Modify.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1904-85-0x0000000003CB0000-0x0000000003D08000-memory.dmp

    Filesize

    352KB

  • memory/1904-84-0x0000000003CB0000-0x0000000003D08000-memory.dmp

    Filesize

    352KB

  • memory/1904-83-0x0000000003CB0000-0x0000000003D08000-memory.dmp

    Filesize

    352KB

  • memory/1904-86-0x0000000003CB0000-0x0000000003D08000-memory.dmp

    Filesize

    352KB

  • memory/1904-82-0x0000000003CB0000-0x0000000003D08000-memory.dmp

    Filesize

    352KB