Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 03:40

General

  • Target

    856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe

  • Size

    1.0MB

  • MD5

    047187c8dc466a354acb17192de48bdd

  • SHA1

    1bf147c660bce0a5627d68e2f67c936ec38a8633

  • SHA256

    856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463

  • SHA512

    8aa2ee92fc73240f7cebe5c7433076a62bdf403d8b97ac6d0cbc3ec3b8b808ece418a5f836f84d5baf0b6cab44f85ddff556f3e6bad5474e0e257e5cc1d2e7a1

  • SSDEEP

    24576:OUiOgNMUUHR4cR4/vj52mC/NqIB3X4RrBhFs:9BgW7HRb4vFq4RFhFs

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://unwrittenuzy.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe
    "C:\Users\Admin\AppData\Local\Temp\856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3960
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Boat Boat.cmd & Boat.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5068
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2020
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2080
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5112
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1432
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 686105
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2172
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Attend
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5000
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "molecular" Awards
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4100
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 686105\Challenged.com + Recorded + Mtv + Companies + Sonic + Fin + Wired + Quick + Occupation + Developmental + Shield 686105\Challenged.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3132
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Appropriate + ..\China + ..\Depth + ..\Kyle + ..\Latvia + ..\Taught Q
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3676
      • C:\Users\Admin\AppData\Local\Temp\686105\Challenged.com
        Challenged.com Q
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3156
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\686105\Challenged.com

    Filesize

    2KB

    MD5

    0b0564f10fcc49ed87ab79fe5e55fd1d

    SHA1

    f161c204249c1095cf85f5d4c627f36168b41729

    SHA256

    79fbc67a923692ecdd524ffa40946b9bd50db4af476c7c0ac3e056b397f554b7

    SHA512

    e4dffe47d02f5dd31785b556c05e27e9fd701d9c278aac1f1f0250b0f06171222ca237ce576c960115da8ab74bc65574452d124e64320b8640b6a94adc23556d

  • C:\Users\Admin\AppData\Local\Temp\686105\Challenged.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Temp\686105\Q

    Filesize

    465KB

    MD5

    4eea8ef05e53a0e932f541f782fe04f5

    SHA1

    18dee77234a6196c0b88c38019d0260e60aea089

    SHA256

    18d0b04337185f18901ce6a3fccab9669871dd68c1ba18c4fc5d8ebd18f842a0

    SHA512

    1aac5e816a736a1dcb45fae8a9b501c1ce042f133e6a6da6aa04d6bb7da7f5128ca6c979b6c6f72468e04757895466dd6b14a27636c8ea74a23b34ae83cc7e74

  • C:\Users\Admin\AppData\Local\Temp\Appropriate

    Filesize

    79KB

    MD5

    889b4df8e02c44f15d928979a1526a89

    SHA1

    20c4b9f1753080e78800ba06f769653d5d9b88e6

    SHA256

    4522abc9637f7ecd25589017b66746ff4baf20c9e155c6ca898f143eafe13151

    SHA512

    e36aba468fd7b8e70bf887ff05a23cba72e1151d14187b560395516a845dde2481982c215c29a179f8ac8800d2b41ae5ccd20da40793514fb76800f100ed5d54

  • C:\Users\Admin\AppData\Local\Temp\Attend

    Filesize

    478KB

    MD5

    a21648eecc1ffe4a3c22bbaa26be3620

    SHA1

    80220f8ce3bc9045d4ef3a582d7600d0f6b29f72

    SHA256

    a2877ddc986c2f4a64c1e524ff2a254d7c9f7d7a385862e57d882adfef2be75f

    SHA512

    a06b78aed979dcadfac9e9b460c7faf33d3085943ee0d496947a1faa7ded0a129e56a81320a4a0fd44db5f19860dc79117c6365c6352341b92b316c42ed859c3

  • C:\Users\Admin\AppData\Local\Temp\Awards

    Filesize

    2KB

    MD5

    11beed5ec40a6661f00a9dcb0d172532

    SHA1

    9add533cf3f32a9995c237a0f785f63711d72d4b

    SHA256

    736138481ec159225ca4d2db5fd9bdbc686f635dccac7a413fcfe6f13f3dae22

    SHA512

    bffda16a687661c6c2a44960aa5f5d134b571b886abbe80d81027f60ee2c51c22cda3d3d1587f8de7c8635aac45470819d0d79dc3a576c7273b2219611190d85

  • C:\Users\Admin\AppData\Local\Temp\Boat

    Filesize

    11KB

    MD5

    981d8595db467ddb19ab9ce140333d86

    SHA1

    26ab8d6ffa7797b1198bbbd3d92403ec357f73e2

    SHA256

    ad9c3f5967d09c5a1ab46ef960761f8de0b72dd049a18883036e6689f8e17c64

    SHA512

    bada40f6cebfb715fb9e88b7fa57b9fa3b86cacb1eb2ba661eaee3af197ac5f1c925fbda36e4c5803eeccade9a6c92d993a1236bf5759c25e1399f848fb2a5ec

  • C:\Users\Admin\AppData\Local\Temp\China

    Filesize

    50KB

    MD5

    e8e5ea080e74fc4a214cb16959fc90d9

    SHA1

    ed30cff176bea84f2688c0e63c209a17ace16fb2

    SHA256

    ca88df3defb2382dcce752205f72d5d04016701463a375c0abd1edcae957dc4b

    SHA512

    9908c13bc90358fc1dc5611856137b4af76ed95be2d155d072f2f0bd3394474e78d225f05c849e0edd00e7970e25a286dd5209c79ee1fb2a37618460bdd7beb5

  • C:\Users\Admin\AppData\Local\Temp\Companies

    Filesize

    64KB

    MD5

    4a8e3a487e281003724f042c068452ee

    SHA1

    84f463cc6e983fd57b63edac6530b41bfb447dab

    SHA256

    cb88804b935c409e4acd609145289010dfffd14c41d61be3ed0afcb80584eeea

    SHA512

    5c84882c87882cea482ac060f3bc4f611faaaa16ddb214e36187f89e177dc485773f872cce229d0a78e3d0bac1577681c99501ebc65542aceb015231ca2468bb

  • C:\Users\Admin\AppData\Local\Temp\Depth

    Filesize

    94KB

    MD5

    fb08bfbba7bbfaffb1bef33bec0325b0

    SHA1

    cb5c2bb594356dec00dcd2b7efa43fe2fc6b42ef

    SHA256

    b9537b016b1d602532c1f4dc635ab8313ed26b18dc4f449cd6bf79541c32d64f

    SHA512

    31b8c85cd227921a1ef99a341c3ace5b19463ba9b8302389ffcde0a1f65d2902dd65bb1bd10967610c3e7bd622f209c9959d9e8c9d951acdbbda4d43469a1829

  • C:\Users\Admin\AppData\Local\Temp\Developmental

    Filesize

    113KB

    MD5

    d961b5ef55b28b1c8bd2e01ac2fc727b

    SHA1

    13d92b9408efd5d75b89bfcaf71c767493566e49

    SHA256

    be316c27f60f8425bb8c3147f57f9a5f6ed0bd6cb4ae6deb01e4c4139bca5b9d

    SHA512

    6d9e317aca5ad47c0578146a4f17f5bc17e3b9e03cd7a1d83f2a42adaeecb0676132402615a2e458e380919c3f6173439c911fda028e255490ef50b606e86dc1

  • C:\Users\Admin\AppData\Local\Temp\Fin

    Filesize

    103KB

    MD5

    487e92f25b04be93dc5ba74fb4a1b1b5

    SHA1

    e33f756a9e9903ce42147f41c98a73e9d9808bb1

    SHA256

    4064c9b3d6ca23dfa3c649acf6063c6943564a7e1b0a229272bdbb3ab7d4c366

    SHA512

    91edbc05794a25d7b8b6d896bddb6e7b8b175a3ece3b01ad96dcf27a2b344d6a38e768e0a00c6131044f448be67a066ce18a3a1264d1db351e6592f6c2bb200e

  • C:\Users\Admin\AppData\Local\Temp\Kyle

    Filesize

    95KB

    MD5

    8e79818b013611e0e14a773ec6a06fc6

    SHA1

    f77ab0acee0b4c51bf6a554a5102a7f02e78e3d2

    SHA256

    395ccc10db87bc5c7dd79f7f897cc449e70be70cb20c0982b7d41ea040283598

    SHA512

    bfc8b33b183828221b1938ab2019eb00b6c55d9c13dc0df9492d2e44860e23b93af89024fe1cd561c7c48623b0d17859b08b59f3d65be0f6f9f4f1ea8e4dd3cd

  • C:\Users\Admin\AppData\Local\Temp\Latvia

    Filesize

    87KB

    MD5

    7a029bfe59cd61dcfffa55f8b742d841

    SHA1

    f82aa42c407dc648f7b3d88fba819664d172ad72

    SHA256

    e33cb6f432ca1fe7b7ae317a2fc761542514201e9835b2bb98d7eab7b3bb43a7

    SHA512

    036ae62461493ca65382ea2506e3da7a8356c17bf4e90584624f6f51bb2bea36ee73509aa4d78927ade57506be0488b3f53eaa5028c28248d8a0af5f0939a373

  • C:\Users\Admin\AppData\Local\Temp\Mtv

    Filesize

    139KB

    MD5

    7b57f0747ffcbc6352d12f2e4f6f420a

    SHA1

    228758f94f5531cdf2edc5a76777d6b85b00408c

    SHA256

    55caa179db8c37f3eaaa145a36a586a9a9cbb0359e87c0797d7711c419ba6803

    SHA512

    d27974b6a24e5fe8de7cf9c5fd1e2adb911a1da46b25001294b567ca718cfc774f5308081938c914b563070ba5361d181edb320e01f883c446d398c380444ebc

  • C:\Users\Admin\AppData\Local\Temp\Occupation

    Filesize

    83KB

    MD5

    9057c390318cfa1ddd9d6286bb8a805a

    SHA1

    fe30919fe9069e01e0d8483c7ec2c078380c8ac2

    SHA256

    23c0cad22e59a1838a557aa4af1ddc4b727cd6171f475434bfbd6bf9069bd502

    SHA512

    1d26aa3eb7f30096ad08accc4aa0190c142a10ccd1bf20da870da3541c051b0a3cdb7fce6265fbfcb6b89edc0fb3e6f50f4041e7977972be825c888d60dd926b

  • C:\Users\Admin\AppData\Local\Temp\Quick

    Filesize

    81KB

    MD5

    1c3c56941ea2347652d7e8b21fc78343

    SHA1

    e194e37057f0940de764090686e0cf972f9d9496

    SHA256

    ace39f0b7357d6ff14f4ea0d4eeb6ba2e88b9838e4826f9b4213c91218140738

    SHA512

    90d99737e07b0b9df208ff7f3a2aa1790679174930e74d3a3e09d00d888a6b16b02759baa029194bed02b03e16198bdb77518bbd72e6c31a24b04543b4ccae9c

  • C:\Users\Admin\AppData\Local\Temp\Recorded

    Filesize

    91KB

    MD5

    51de0bd5547038d9d31f708f34390200

    SHA1

    969131aed62c3bb2a0c5398df79d5e7d7588540b

    SHA256

    05c9f35758b75c7017a5a1afd9c15108c832f11910a9c87f33d63148a80386a2

    SHA512

    870d407b3aede5689ad67c8bfbd6607ee90594559e88cbcfff0bcde674f24e4600a8efd1c2bc9db003a861115cd51e0ba4ba8f819117b2cc0c735f7cefc45e32

  • C:\Users\Admin\AppData\Local\Temp\Shield

    Filesize

    35KB

    MD5

    3a13a6d858eb5a2c7f5a8ae68ed28de3

    SHA1

    f1fd6a4292805f8882bd35ccff3da7c038fc33a1

    SHA256

    23376867d6e7ab3f03913a7579a544a85d5288ec66977f19871155e518c5b46f

    SHA512

    5168cd3f54ab31be4a3b6f140f9a3fc6ec40f1dc1ac5c5f0e81d60eb892f96067ea4a26a685a56ba76dc48997d53bd444e0f2d5a72a93d49684e563933cf1a34

  • C:\Users\Admin\AppData\Local\Temp\Sonic

    Filesize

    145KB

    MD5

    d92f2a66972b9faa8de548c1fced8691

    SHA1

    8129a94738378fea02a022c7e43b17bace4dedc8

    SHA256

    34d674fccf583e278517993629e56a8895c321cbcd0f99c1d7fbac613d28f7a1

    SHA512

    e1ff6699330e4d1a93d60c0dd20184a4f5f6cf6b7b55b572699326dd75fad10facf695632b7d33d9f692c63ad472002e4364f932ddef9273eb029c6e02b95a87

  • C:\Users\Admin\AppData\Local\Temp\Taught

    Filesize

    60KB

    MD5

    6f304e5f2a7926d4a1a17f2cd8cc7f6f

    SHA1

    13621fdb96f56d451ceadbae0640d37e8863f646

    SHA256

    ebf9c51228a91209a8cd5680b4ba8a6497bbfcc0b602723e8772590b966eceb2

    SHA512

    2186d136c4f2a4f458c713934abeb949642d7d7331d0c4b25cb43113fa401daf4254042b28310a27165609ff1780b1917d92cdc83d9b4ebd530a716d810cac29

  • C:\Users\Admin\AppData\Local\Temp\Wired

    Filesize

    68KB

    MD5

    cf54118dc56610a97cd19ba6171475cc

    SHA1

    bb6d3fb0e444651ad3d819b346e533034f3b9766

    SHA256

    875974480ba6e9ca1e199a4030dd21b916f889e0b958c49c843887a5c2f2ef0a

    SHA512

    73948c9bbd5369f165944217b630992f560563ef9f4c7b43fec3b4a9a5c6f12e5828e50d2b60bae9bbbe8c80aa063500a90e1c83f9c1cdf8915000d02bed5367

  • memory/3156-69-0x00000000002E0000-0x0000000000336000-memory.dmp

    Filesize

    344KB

  • memory/3156-68-0x00000000002E0000-0x0000000000336000-memory.dmp

    Filesize

    344KB

  • memory/3156-72-0x00000000002E0000-0x0000000000336000-memory.dmp

    Filesize

    344KB

  • memory/3156-71-0x00000000002E0000-0x0000000000336000-memory.dmp

    Filesize

    344KB

  • memory/3156-70-0x00000000002E0000-0x0000000000336000-memory.dmp

    Filesize

    344KB