Analysis

  • max time kernel
    30s
  • max time network
    25s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2025 16:22

General

  • Target

    Setup.exe

  • Size

    1.0MB

  • MD5

    ba52b93e35e712131abf54b3beebe9d9

  • SHA1

    5b8d0b6bc17a3df52841b8613b1979b5e449c22d

  • SHA256

    0555af36f7abfc34335e2701597f632adbecd006a4e5748ec302700298bce2c1

  • SHA512

    af4b635a658ffae9b34b0401b784106d42e5aa5c03433605881bd437d82fa0f29d5dcecf146e05c28b5029c938b8a24b85e1a375ad7574ddb20453222baf532d

  • SSDEEP

    24576:z6TQ5thBJtSyFKp7SsQOZ6hrqqLtulvMr2EH:2g/cUOchrqatuZm2EH

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://drainytwiggy.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Basename Basename.cmd & Basename.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4312
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4028
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1632
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 17474
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1956
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Temperature
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4264
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Site" Practice
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3304
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 17474\Revisions.com + Homeland + Incorporate + Locate + Introduction + Adapters + Bird + Language + Siemens + Those + Sf + Yn 17474\Revisions.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1212
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Shemale + ..\Anatomy + ..\Treated + ..\Kentucky + ..\Keith + ..\Substantial + ..\Publicity W
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1588
      • C:\Users\Admin\AppData\Local\Temp\17474\Revisions.com
        Revisions.com W
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4300
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\17474\Revisions.com

    Filesize

    1KB

    MD5

    84c8378bcc727c504b77d03aa2d8c47b

    SHA1

    d1c212bb165aac942848e53d98eb4afaae01ddca

    SHA256

    026ed9db19a01f41eaa2f7459592432ad8ba6eeaa0b5079db1454f0782058239

    SHA512

    209ad446ba88d3913e4a9abd73e1b747315bea446895aaee8e5d3e075fa81b57174b29a6fa33452483cf14105b7ff70528b405337ad15c034b9ade8806cc0fb3

  • C:\Users\Admin\AppData\Local\Temp\17474\Revisions.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Temp\17474\W

    Filesize

    481KB

    MD5

    fda04206a6c8d912c23d2df26e104483

    SHA1

    a450d093243d97d9b2257c7a1bdd208cd6c62fac

    SHA256

    061f7bb9fe901ad4bc0f86794dc2144211303bec89120429182edc78d2290327

    SHA512

    f3dd8bd58540d488faba5997be6f89cd821738cf63fb9396d0259a449594b3187e5a0047a0ae29d2cdaf72198438248110a011f555d5a647ee1de2f2e223a190

  • C:\Users\Admin\AppData\Local\Temp\Adapters

    Filesize

    53KB

    MD5

    dbb8fc25e135c14c845d08a19284c5a7

    SHA1

    808ccd041dc0f163d54cc3bc8f3f2855ed2debce

    SHA256

    f75759b20c3ab30c084025a9f6bf8dc2d009999b1b7565c00f1456fa9ceb0897

    SHA512

    908f18a84d8c3d327ed0215c4364db6098c7cf6ef7288af0a3174621e5ca9a0c344e1159503b1cee803bad0f19365553bf1365125158e851b6d99588845f139e

  • C:\Users\Admin\AppData\Local\Temp\Anatomy

    Filesize

    83KB

    MD5

    dcd8f2dd9f0aba9270b3a962a082c1fa

    SHA1

    532bf37c0cc95123f3e82a365bf05e5de27578d3

    SHA256

    db0e739a56c11c3e1ac8b5b90305216935b2c21a5275a57c0fc0b3128cb3561d

    SHA512

    304b21c6d16783773988796ee4d36f769b6ec5528a0862a551164dcc09a912c8a1ae7f2c2daad615fd549bd96fee422c3f69a61360e64f0442fe4ddecdfd06e5

  • C:\Users\Admin\AppData\Local\Temp\Basename

    Filesize

    30KB

    MD5

    73c59c4554ae97c36eb48b91273759a3

    SHA1

    37388aeb675c6f3e919efd650fd2098d7d3a7da6

    SHA256

    a5cce371c8a926277ef47fda981b7689c95989361da2ca10e993dbd9201ae625

    SHA512

    501466ef66952e70fc8beb01e228eb05683233fd7895c7bbccdbb9be0dc96980e12ac97c5644a209e8abcb44fac16fbe3cd65272f6c39a15f3b37b416445a308

  • C:\Users\Admin\AppData\Local\Temp\Bird

    Filesize

    109KB

    MD5

    7b9628e63cbdf279f5480ef0cce6066c

    SHA1

    9f61c44b114203f48044512c5543e8250d2e5a5f

    SHA256

    bc191ca86b3f02612692291a5f519829bf271ff819f63aa5a1736c710d8d3157

    SHA512

    c330f93e293a9259a28c38ca649ee4cd2830124e5434c9481c8d419c180f6621c310c1a2e07e92530c26439b5c73dd3257064666cb368035247a1bb7698ab43f

  • C:\Users\Admin\AppData\Local\Temp\Homeland

    Filesize

    81KB

    MD5

    28ffba3281803622458947cd320a23f3

    SHA1

    022442a671bc5c56a1c35921d3b41e07e6fe4868

    SHA256

    f4b204c03bb73684f577e81a445827665091c1c0a3c4b02b6d571d976f00d477

    SHA512

    4b21ef64f42187fd056d5056ce429658da9103c075e00e016962a86b63edc297f23d402edb0aa6d9f2d0ff6123f0624e424446af73c10ec097aebabc39e8a29f

  • C:\Users\Admin\AppData\Local\Temp\Incorporate

    Filesize

    98KB

    MD5

    cfb3f4e73232b3bc7f8719df0265a4b2

    SHA1

    57ee74233b2e33afdfd664d0e28e5d1e9e87c076

    SHA256

    022193bfa4824f1565a2008a537670e3f71f430491fc48fdb67edd5c1b4e16b8

    SHA512

    af7d06f2d4c4ad0a83be91bf93f2c5acf5cc3564de7a21af5179b2ee2cd6aea2440fe53b3184f1107775f0027a781a9d1ad93668678e0fa764279c6a4571c2fc

  • C:\Users\Admin\AppData\Local\Temp\Introduction

    Filesize

    96KB

    MD5

    e54812a27e0aad02f730eb7ee4e37f94

    SHA1

    e6eb178b058bacac46ee05036b5da583abb53a14

    SHA256

    f34665a52e9885d795ec7082acdf62628e6f88c5f5f67878d2105229f70f36b1

    SHA512

    b3d6b1dfe8c2c615bf54b49434a7fa1c1c038ba89947d54a5da1499f3fd33a2be0254ddd9b319f6306de7f6ef0e9c1444dfa38212248737172924acf8888ae79

  • C:\Users\Admin\AppData\Local\Temp\Keith

    Filesize

    93KB

    MD5

    c5ae55c8e6625ac189987defc867a39a

    SHA1

    7c6ef14cf05d74451afeedd383fa622815e6dfc3

    SHA256

    72ec50c30793434f5e7dc6c2908936d854a6391b580f445abf26990805289455

    SHA512

    da2c1eb4981bb57dda34a2d990f8e35a29d1388a09d8ddb702c58c40d32101907d5eab2798cf6c3a5b7d4b89d387fb01e2e14959c49e75aaa4779c977a6191b9

  • C:\Users\Admin\AppData\Local\Temp\Kentucky

    Filesize

    74KB

    MD5

    4474a58258494cc09ebbce55f89a1715

    SHA1

    ddd1b61462dcec3ce420ffee77bbb6c22d773986

    SHA256

    91cfdc65307561befdfe14b745148b7416155d4aba02e38d84be09e9247eafb9

    SHA512

    fbf68d78a8db5e803f2a442aa704254b5b239cc4d40ce01f1b119a3e519701166ca8f00bf6722d63daaf0f0cab1fa3b9068060ce1966ae8b279b3956d14fc2ed

  • C:\Users\Admin\AppData\Local\Temp\Language

    Filesize

    112KB

    MD5

    ad2fdc1f2dfffb1cb4b77722f63061fd

    SHA1

    ea897eb1426f5aae86971d5f692bc1687473d13b

    SHA256

    f7f55fca66fd661a4df2e1dd27fc82dbedea06f66d0ccf13f5b26a1e6e0c4f8a

    SHA512

    48714a7f8ee4d7f8b96f4fff1df7b5b2e9f5d31d36080c95809c4073a97b545af948006ceac10174309e383a2c6236d1ba0449123e11e515dedafb778638815d

  • C:\Users\Admin\AppData\Local\Temp\Locate

    Filesize

    63KB

    MD5

    28723705296ac2734224c71ac4c8770e

    SHA1

    b47fa7d08529635cdaa577b098b3035361bbcce7

    SHA256

    7e07495ca91f84f479f413250c628d079e1e9cb18b616b4bfac2966822d13542

    SHA512

    7674e59fc48263bf1397224077ec13423d46d061fc8d64001eb6e1226ac9afca31fa343c14edd4463b4238d3f73839e308ec8f6c16d0e376cbdaddfb161d8fad

  • C:\Users\Admin\AppData\Local\Temp\Practice

    Filesize

    1KB

    MD5

    59fe14408f03f12250b04eb4262c76d0

    SHA1

    a076820aae13c2d75a19365918e748df1b000588

    SHA256

    c104ed02de914a4a6f4189f7c737de404ae400421797006ceb79a95bc66cf11e

    SHA512

    e42e8ac64ea7d86fce0e5c0dde9989c333521759a4bacffb7b56a7168e3b232204197ec9d52e656c917853fb0a7fa60dcfcbc4020a138ebde4899be1f79dd09e

  • C:\Users\Admin\AppData\Local\Temp\Publicity

    Filesize

    48KB

    MD5

    bdb7cce8f817b4fda19ebd2ec9736d98

    SHA1

    dfd89cfb3e625d58f2907b66b4e6709c90e99df7

    SHA256

    e3ed067152d0ba3f4b716f7380b2ff59475e6ff6afee4a31e7b42a5fcda2408a

    SHA512

    7427e3a82aed0d3e5956434819481bcfd27863a39110d58284bb6cdc51ef8d3ef8722ecad75fbe3ae1ca90dac28877b62328db48d334810a9962b526dcb736d7

  • C:\Users\Admin\AppData\Local\Temp\Sf

    Filesize

    57KB

    MD5

    af65b15ba64d8330e0672a0b016a580f

    SHA1

    66d4c46d975109673890dc7a63531349f2b939e5

    SHA256

    d75aff9ecf5199443606f8436c01b5d2f604266e5056408d461767513320fb2b

    SHA512

    5fd7203816406315f426aff64c8a87b68ad46a5c84e169860c2df6173ca411de096e13b43c115bfdb323d460542e96552839ff65a9263bd8d813195a5e8ee949

  • C:\Users\Admin\AppData\Local\Temp\Shemale

    Filesize

    65KB

    MD5

    6620766e43b9b83cedf1024291c5e06e

    SHA1

    d79b50ed62c6dbb50cc4c1109b76d1fdf42d94a2

    SHA256

    50108ea7881217853c99bad9a2f84f3a263379c71d87a51ce23de456d548506e

    SHA512

    6124779e62eef0b6785e077acf257b7daf74d48c786d43d69a21634c582c3873be8ee2712997dbd5726d648625d4b15e4e39dab567720914c056dbfaf2eed791

  • C:\Users\Admin\AppData\Local\Temp\Siemens

    Filesize

    99KB

    MD5

    373898a04d7c16dba5c4df2c51b07699

    SHA1

    d3bbcb5324dced033c3260ddad66a5f3df44510d

    SHA256

    7b5469a289a0087a3064d0f2a00a45f83c1a78421bf90b92ac88f0fdfb94b49c

    SHA512

    1de55246dc79597ab5d1e3aa793d0b147293cc0222df628e27dbf3ece7958bcec23b14ce44645d86bb5e76041224274ee16367d021c57ba74f771bf06a6d7158

  • C:\Users\Admin\AppData\Local\Temp\Substantial

    Filesize

    62KB

    MD5

    ab7be9a676df97c91dde15014c4d14b5

    SHA1

    79fd7ca96e7c63606f01b9aca90a1f5b7a57f53f

    SHA256

    9194f0709a71b48e6c0bf21d03d51efb0e39cf9657154026722ed6f352a73961

    SHA512

    b8149676ee46cae84f1a97594329a421cb94f9a1349a67c5c29575c0351da9d92e942b5f706d1e4980fece20f343fd0fe1b15e21eb56b1f1e759fea384a79ffe

  • C:\Users\Admin\AppData\Local\Temp\Temperature

    Filesize

    478KB

    MD5

    cf911f0fd5d75c7556bb30db32c81d53

    SHA1

    aafbfe45cffb7e057d94a5ff73884e0f41a168f3

    SHA256

    3554fcb90e3813d1ffdeedbf912351b3fadbc53ad4b625f75dce6bb9807f3a02

    SHA512

    6745e0bfdef26fe48de99f68a822d3670bc8f90142d425ea1cdb37a0280f3fed90ae318cf3e390a548430ccd7efe8458cb8f6009f7ec43dd33658e964a1e1af2

  • C:\Users\Admin\AppData\Local\Temp\Those

    Filesize

    125KB

    MD5

    f7de339870f633a370e1a8250d134c4b

    SHA1

    fc5b3db2059a8b7e1f53f5761df80982e0df3cac

    SHA256

    1d282203e8cc3e4c912663e5a7cbe1fc1fc1cad4538ec704ce839242c0bcb119

    SHA512

    9560cd644222e2f7354093726568de37d79415d4ef0e57d8685ad4a14bc0ddb5f4ba87f36430a7c843d5bfbd8d2ffdd454d300750a355d3100e6dd6758c237bf

  • C:\Users\Admin\AppData\Local\Temp\Treated

    Filesize

    56KB

    MD5

    4f40825fb9f06e2c88191b4661e66ec8

    SHA1

    84b614e1039f01eefb1eba604633c33dac9d3a51

    SHA256

    a40aba957b9700eaa42f492b3f559065c0bd3a7b3c986aeadffef0de9a87566a

    SHA512

    eaa94224b65d2e53306dc821a5d56eea1baf58c80a7891121a1eb4db8d83ea3c0200f55c87cdde8f3c5d1feb78cdf113aadcd756fca98bc35f1b19e16e85511f

  • C:\Users\Admin\AppData\Local\Temp\Yn

    Filesize

    30KB

    MD5

    a9a36153b0fc4b87ea8548ffbb4f3047

    SHA1

    a6d34e67dc65557529228f0b0d1cb57b9738abab

    SHA256

    8fed3e54657829f528db68376cc4b7ddb7a4ecc2546bc8a83bf659af2447147c

    SHA512

    ea4248f2d090827aa3bf2ffb13cbd36cb4229d28e6fa17bba6d401cf1a6d97314b8676fd302bcfeb9a3510df15d1d53911a549e5572c65eda0876528dabd9a1f

  • memory/4300-75-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/4300-74-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/4300-77-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/4300-76-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/4300-78-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB