Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2025, 19:09

General

  • Target

    2524ba86ad74354568814ce10acaf5b1d2051c9769c384849306c4288899ee60.exe

  • Size

    3.1MB

  • MD5

    b0f809ab05260749f441911a983d2653

  • SHA1

    cbb1ea7e30c543e06325e130bad735c4be05bb10

  • SHA256

    2524ba86ad74354568814ce10acaf5b1d2051c9769c384849306c4288899ee60

  • SHA512

    d2489ed344f8a96f2a4544f1572ffdc5b5db078e839b0fa7c07902647720eb50a573af2a5c8343b9499ab9fd8cb33a9efc7adb99328993f96fc81c22967a3afa

  • SSDEEP

    49152:CMKO1on9iWK6q/C3luTg5Iokb7yfFTW8ibDw348JKVi+KmD6gAGbnwFk:C01Zb6qwuoIpb73Fb84oKzJAGZ

Malware Config

Extracted

Family

lumma

C2

https://showpanicke.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2524ba86ad74354568814ce10acaf5b1d2051c9769c384849306c4288899ee60.exe
    "C:\Users\Admin\AppData\Local\Temp\2524ba86ad74354568814ce10acaf5b1d2051c9769c384849306c4288899ee60.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Users\Admin\AppData\Local\Temp\Hackus.exe
      "C:\Users\Admin\AppData\Local\Temp\Hackus.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1936
    • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
      "C:\Users\Admin\AppData\Local\Temp\Crypted.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1144

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Crypted.exe

          Filesize

          154KB

          MD5

          078dd8a7d37a595a810bc74259df2da4

          SHA1

          f907f1c7b62b2fdc8d271c574fe69974c3196ec9

          SHA256

          9043fddbf88a56f784bf4d52c3ddf7837cc8206e77fe831755e8ec511e5d4329

          SHA512

          59bfe3b445955f2e6e33972fbfd5b27b8a28ad5d2222723155ba282bde323e788c50b2ea4f22bd4c714935f3502baf2cf7ae32173384af0fcddac3398119d963

        • C:\Users\Admin\AppData\Local\Temp\Hackus.exe

          Filesize

          2.6MB

          MD5

          b98582a96f3d102a3d45e7ed1111268b

          SHA1

          b1f4886d90acf2ab70477a043dea8b668a7494bc

          SHA256

          fb5518b93f5a75c4ddb033a5a1e8189d2e8177c863c8b86c0adbb2de90a928a3

          SHA512

          51530cbd2a90a0687203132ea5e8a40c7dd0ff3275e1183020ebd60707a360f66106eaf1856716f64d24ff06b0fd2ad1e29f12019e7d68bf00dc9cbe3a7afc1b

        • memory/1144-23-0x00000000002D0000-0x000000000032E000-memory.dmp

          Filesize

          376KB

        • memory/1144-27-0x00000000002D0000-0x000000000032E000-memory.dmp

          Filesize

          376KB

        • memory/1936-19-0x000001E3D8640000-0x000001E3D88E4000-memory.dmp

          Filesize

          2.6MB

        • memory/1936-21-0x00007FFC53830000-0x00007FFC542F1000-memory.dmp

          Filesize

          10.8MB

        • memory/1936-28-0x00007FFC53830000-0x00007FFC542F1000-memory.dmp

          Filesize

          10.8MB

        • memory/3944-0-0x00007FFC53833000-0x00007FFC53835000-memory.dmp

          Filesize

          8KB

        • memory/3944-1-0x0000000000CF0000-0x0000000001008000-memory.dmp

          Filesize

          3.1MB

        • memory/3944-4-0x00007FFC53830000-0x00007FFC542F1000-memory.dmp

          Filesize

          10.8MB

        • memory/3944-26-0x00007FFC53830000-0x00007FFC542F1000-memory.dmp

          Filesize

          10.8MB