Analysis

  • max time kernel
    0s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-de
  • resource tags

    arch:x64arch:x86image:win11-20241007-delocale:de-deos:windows11-21h2-x64systemwindows
  • submitted
    16-01-2025 20:08

General

  • Target

    Fluxion Launcher/fluxionlauncher.exe

  • Size

    339KB

  • MD5

    0faa74d371ad58d493b2df890c610774

  • SHA1

    c7a155aca4a20258fc1105b91d5d94205415546a

  • SHA256

    4d6330d6d983a30c5a0e469058075e96b6e8109daff1ac41a910aab2621f488d

  • SHA512

    fa603a7a93062d72ff33e3a0562357169148470ac0defef8145d629a5efa7e87f5481a82ee1a7c4e8bcb26e242f7fa4074076f2ca0a08fa0e0b158544f9da223

  • SSDEEP

    6144:CZZzgHPaRciI8PDjb17g5esNPwOR716Z6NWk8C93PG+gHT8oAu7us9SOq3KZts:C/Dq18PDdJNOR7cZdk8CZBiT8obus9LO

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://robinsharez.shop/api

https://handscreamny.shop/api

https://chipdonkeruz.shop/api

https://versersleep.shop/api

https://crowdwarek.shop/api

https://apporholis.shop/api

https://femalsabler.shop/api

https://soundtappysk.shop/api

https://letterdrive.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher\fluxionlauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher\fluxionlauncher.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher\fluxionlauncher.exe
      "C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher\fluxionlauncher.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3464
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 472
        3⤵
        • Program crash
        PID:2384
    • C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher\fluxionlauncher.exe
      "C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher\fluxionlauncher.exe"
      2⤵
        PID:5080
      • C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher\fluxionlauncher.exe
        "C:\Users\Admin\AppData\Local\Temp\Fluxion Launcher\fluxionlauncher.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3988
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 484
          3⤵
          • Program crash
          PID:4272
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 840
        2⤵
        • Program crash
        PID:2008
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3988 -ip 3988
      1⤵
        PID:2220
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 584 -ip 584
        1⤵
          PID:2344
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3464 -ip 3464
          1⤵
            PID:504

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/584-0-0x00000000748AE000-0x00000000748AF000-memory.dmp

            Filesize

            4KB

          • memory/584-1-0x00000000001E0000-0x000000000023C000-memory.dmp

            Filesize

            368KB

          • memory/584-2-0x00000000051B0000-0x0000000005756000-memory.dmp

            Filesize

            5.6MB

          • memory/584-14-0x00000000748A0000-0x0000000075051000-memory.dmp

            Filesize

            7.7MB

          • memory/3464-4-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/3464-6-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/3464-9-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB