Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 10:47

General

  • Target

    7de65436f8f2c64984893abe62006fb7705efacaae538cd5fbee80e018173e97.exe

  • Size

    24.1MB

  • MD5

    8b98d4df7915f31157e2d83d16b1161f

  • SHA1

    5b5da1fcaa7c6d3f3a21a3a90ca206514ffabc6a

  • SHA256

    7de65436f8f2c64984893abe62006fb7705efacaae538cd5fbee80e018173e97

  • SHA512

    150e9788f496c40645bafc7e1b87b7ad86b729fa2e2db0c8ef695744ad7480a20d984ac1fc2da077e860c504cd0b6cc1f5d974b68b8ec30b2b86af6db64a9622

  • SSDEEP

    393216:uZXVLSzZdf1ln6UghRzy4lvu6tCzIBEq/QClLzSzn8xL4bU:cmzTf18VzgSEClaznM

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://whitebeauti.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7de65436f8f2c64984893abe62006fb7705efacaae538cd5fbee80e018173e97.exe
    "C:\Users\Admin\AppData\Local\Temp\7de65436f8f2c64984893abe62006fb7705efacaae538cd5fbee80e018173e97.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Report Report.cmd & Report.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3036
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2696
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2720
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 488819
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2824
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Webpage
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2848
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Commands" Accept
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2764
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 488819\Aid.com + Mitsubishi + Lift + Resistant + Mods + Rental + Greek + Hometown + Illustrated + Old + Campaigns + Len 488819\Aid.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2604
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Signing + ..\Chase + ..\Southampton + ..\Ul + ..\Stranger + ..\Generous e
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2644
      • C:\Users\Admin\AppData\Local\Temp\488819\Aid.com
        Aid.com e
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1736
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\488819\Aid.com

    Filesize

    1KB

    MD5

    72129ded1157bb7d47c140a37e586a63

    SHA1

    7a1f469d6fcacc056d9c24fd92c76cbd493cd7e7

    SHA256

    ceabb9411568bc5b2e75821d21cb0c86b185e982789781013b751d7195053d60

    SHA512

    6c6a57219762b304b345b9ab359460825933751d0e3ab5d8013e97a3146165ca60cd7f0e623365982fcb648e10179486c0ba1e14470de60626179f24d8e8b4da

  • C:\Users\Admin\AppData\Local\Temp\488819\e

    Filesize

    460KB

    MD5

    3b90fb5e0375e7a4533b83ddb32bbbc3

    SHA1

    e2fb60bea25c7119cba171cf9878968914f8326d

    SHA256

    a717eb225360394b308c469e7cdce3cdc976ea882ad811852ff0c23cff5b8f4d

    SHA512

    fc406e1afbe335b29e69536b942a26aa6860ed2c8e823b81aa708af5497f24edf045b7b64ba3ee77e9b899c1df6b06690bffbce9866ccc38caa54db78624ba0b

  • C:\Users\Admin\AppData\Local\Temp\Accept

    Filesize

    1KB

    MD5

    9f74c52ea9359c895f2fa73e3ffec80f

    SHA1

    86cc6d1918c4394490bfcfaa2c9df1cebabdabc9

    SHA256

    d6af76264f2a4af54b3ef0b50351edab3699ec3f9251ffa9861e2a848a1e059e

    SHA512

    82a67ef93d7cc9725bb4efde3f56dd442a0f8094d22aa600f97b3870531a8e2b886393bfd30c631d4b1241dc0d06ac6c76ba97217c26210c4331aec363baa34e

  • C:\Users\Admin\AppData\Local\Temp\Cab6F1A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Campaigns

    Filesize

    133KB

    MD5

    6d8ac147554f0bde1a85e9a0dbc386cc

    SHA1

    82f4472f8f2e75167c350411b49fb4037f3953e9

    SHA256

    0ccd8918ed5a7535fb4cb791bfa7bb1e6d73176bfdb9f24edf69bbec9382d34f

    SHA512

    5963fb1485877db5af156ca6069240e1b46ab7f42366de236632855525f77dfe29c3c5cc6392871dca4b07d5cc0bb6f18e2e2fc8c823a82a54465381defe8bc7

  • C:\Users\Admin\AppData\Local\Temp\Chase

    Filesize

    94KB

    MD5

    d6fd936cf2b9de92c47176923a02969a

    SHA1

    231e05d0aee3ac98b363926234a22ad29e0bf599

    SHA256

    260cfbe7903802a7efb381b5e1aad4f5bafa1fa31bae13b4f5a88c58a4005b7a

    SHA512

    760d50583a5cde2b01c754e7c3c930a9017d9fe5767ee4b4b8b0e1fb93a50602403947ef049d505190ba11ebaa8f3f4e41dd47b87d11f7d3b3e1eb5aff088684

  • C:\Users\Admin\AppData\Local\Temp\Generous

    Filesize

    62KB

    MD5

    4a5346d6365a707e6dbea77ab22af597

    SHA1

    302ff8563046209ec20a88b238802a9f32cc11e4

    SHA256

    66973bc4fc9af0d20f87361e7dddc0f6ecf27ae87dbdd4bfd673f52297f026cf

    SHA512

    23bb965800d32509145169b03cbcfcf825898dcd50e38da5b1304c574c92dc6bd959feaa2648295e9a5d186929ec29636bcc6d8cd450d073cf4af8b563ba0f54

  • C:\Users\Admin\AppData\Local\Temp\Greek

    Filesize

    101KB

    MD5

    6f2d86abf3123b30354cdf292665a670

    SHA1

    740623d260bdd16b864c6417dd557a85b6852fd4

    SHA256

    5ce5bd3e575799c8235488ce50b9163a30f3e0d6044cc89ce8513a3903f5210b

    SHA512

    55749d334fe96ba4fb9740323eb916062e6b7623955472842d5b755cc6a2cd21321574cdf84b0718e3ed82e4ddb987b6cca906d40b8272f711ab7b976281add4

  • C:\Users\Admin\AppData\Local\Temp\Hometown

    Filesize

    82KB

    MD5

    46991088d0585dfbacb56b0f8a7b2149

    SHA1

    7b363b86d85e7f613a7fb94ef0ec6e3a25056928

    SHA256

    09f832a63146aefe12352cde0d6ad7062e3a88be3647687bfda32ed7254027f4

    SHA512

    fa4f91ba7327ed5c49c988a30fc8c3792e3eb81449f6cfe1d93d7e4f85e75fed387d55827ce005602148b6a383aaa90e966d86e151ef93e1e3be1147ebcbcca2

  • C:\Users\Admin\AppData\Local\Temp\Illustrated

    Filesize

    63KB

    MD5

    34bf1251e6970f91a6b6c4fdf157d3a3

    SHA1

    dcbd6c02c281ef8fb8383d8b27ed53b41626f31f

    SHA256

    ce3c4ed3d64506c4a09b3dfed02886cf46fd94578d1c14d0c871bb4bddab9fe9

    SHA512

    ed5b89eb471551273c0d353182873d6ef03f804fce76648daa9adbe90d74bacb924192aa3443c3aab47fa0b794a02071d082899641711c538c5a5c56f5123c00

  • C:\Users\Admin\AppData\Local\Temp\Len

    Filesize

    46KB

    MD5

    16df446fc21d1775eadf4bd7112de234

    SHA1

    d4eddc3597176b46862aa4510b85954e25cc71a3

    SHA256

    6941a1b60d490c7ca443bcec254b877a3d93eed8e33e0063e422123a5a90aff5

    SHA512

    e5ba08ecb9f8086dab8adc9607d113e9cbc043b68e708c037ea26298ef483249d17b68eee6870cd8d3fc319790881bb96695a453ec3eb94f08ee7bb052d52590

  • C:\Users\Admin\AppData\Local\Temp\Lift

    Filesize

    87KB

    MD5

    cd11583e46e9eebf1d09dff63920ddde

    SHA1

    c82d3e1f57c9956837af5acc8876543b1d64e87f

    SHA256

    33b1685c49e660b1f04a01998cc0863f2cf52b2380a6358536678666410f1056

    SHA512

    e71192737e707b9195b03ea1f98fc145d8f67095442bc7275b306dd350ef8764bf0ac90b822b942c48a2ddd0419dd56b40b48d7ee13cabb5a22da2280fe2539b

  • C:\Users\Admin\AppData\Local\Temp\Mitsubishi

    Filesize

    54KB

    MD5

    fe2ac37848235c378f816a2dd5b10f67

    SHA1

    45ac254c92608aa360fcebed7ee025e383b47063

    SHA256

    e3468b1eb0acb937f7d71b189536322aeaa4db793d9d390c58ef76ed80660072

    SHA512

    9380eaea404813dce08a5e015ca683c3fbdf94961863951de9b9dc20de16dc0424f9eadf490b6fa211791af0f9f141cac6d201f96a24e653625549084d2b941f

  • C:\Users\Admin\AppData\Local\Temp\Mods

    Filesize

    69KB

    MD5

    d6abe5e0f684bdd699b1a0c31f58d2ad

    SHA1

    f6cab9e8f16f25b07eb63c0c51d0fd15207bdd60

    SHA256

    e8c6ee6015e310b4430ce8fe357f3495b4b43b53c6851957ae218f40c8930420

    SHA512

    f00678e861a9c7f77801a491946ab76b736c138c46dadc5f8604124d21f510f2c01705cedbc7fcd75f798933a42289cce8e2dc02bcb4ffa379551245ce19e415

  • C:\Users\Admin\AppData\Local\Temp\Old

    Filesize

    81KB

    MD5

    fc3479585da76b35f0ce638f0f3cce3d

    SHA1

    e27f47a8f6fc01c37bd1345ca543a8f05b21029f

    SHA256

    c68ad5df54e58983c16d1f1fd373c97d359f3a0c7b90e956e4eea967a517f961

    SHA512

    a3f1569335c80fa0f34e7d005663cdaf1602e1711463c6217fcd600ded25146179f81561f87c48854246544b401e5f1b97f01fcdc038b8492b44f4c67dccc6ad

  • C:\Users\Admin\AppData\Local\Temp\Rental

    Filesize

    134KB

    MD5

    242bd236a2ba808bed34e2e844dab951

    SHA1

    ba4ee5d051aba359975fe27b9f92e0fc2bdd4295

    SHA256

    d8e039cdd293373dc822cbdaf33523b772dfb2df2f60204c8ca77363b2e3915e

    SHA512

    92a38db5bc1dbee268f9bde8fb21e6d49d19e0c519bf044aa6a7a0445229481001577cc33ffe9a660b6bbe1482255f7a6df51e1a4cc36b7a2429e4941bac9d88

  • C:\Users\Admin\AppData\Local\Temp\Report

    Filesize

    27KB

    MD5

    d18f4b68dee9e7d8aea5bebd2d48d49b

    SHA1

    90499d3667c5dcf1b6ffae038961616743cf0f3a

    SHA256

    42538d6428cbcdb515447292347cbf7bba16a9df9d82661c61bb5dae8830fb1e

    SHA512

    7daa632bfd6494ffb2fdfe43a72e6874ed4c5c32e42e87378387556146e51cce355cc8365ce041d0980fb552ca87345f0745019b8246f1c61db49a72e51bbce3

  • C:\Users\Admin\AppData\Local\Temp\Resistant

    Filesize

    73KB

    MD5

    9a7112640c1323c8cae3bcd473548c26

    SHA1

    196674e4f339b72c06e60e9d0aff6484e67ea29a

    SHA256

    cb3d577bd77430b82c99e55b355a0cb138199e4c9f830b054c8c5197943a9957

    SHA512

    67e982cb5fbe662fc30d68deaaedf9c63b746222b60494d79897773dc2c3df4068cbb6cb4e98a4cddd9ba6eeb422049a284c8e4cfb729fccebad53be7f394bc2

  • C:\Users\Admin\AppData\Local\Temp\Signing

    Filesize

    63KB

    MD5

    53b7bf0717fff75a456fd72ee184f666

    SHA1

    972a9148fedefc9d29f0efe374767faa393d3832

    SHA256

    413707aec6df8b1d0112ad6f2ec22b34bb3f0827caef55b0f25f5fdc4d7f5f49

    SHA512

    9f041278e09a62b479ea7df0b13fc583613fba932abb9ea529f5a62b2395aea13727004de529dddd50c9766de7245ee72b187d5127cee12dc3bcb76da7e53efb

  • C:\Users\Admin\AppData\Local\Temp\Southampton

    Filesize

    98KB

    MD5

    2fa0e9b77c5d631ea1a8aa22feeca092

    SHA1

    351583935303f69b696c84709bb28adb5c4d5629

    SHA256

    c6d3cecbe30c01651c74d25f97df94a93efffc704f0b70afecb6545c9f7de9dd

    SHA512

    65f0332ab46bed731e6cffa7430fb97fd2171c30d08180f3865cace5db0009a05b5e8d44a60e248966bae416a60d358539f8679d280128d713780374a60c1426

  • C:\Users\Admin\AppData\Local\Temp\Stranger

    Filesize

    55KB

    MD5

    32c70d1ec6238773211716eb830c3d27

    SHA1

    59eefd839bc14532ca444956e2d6141be3ca767a

    SHA256

    cc3d482660bd4d4949efda56ac2ac6b658cfd2d25a41554a745afe7c84b7c92f

    SHA512

    08c4bb72707ee80ebd9877d812bd8d65f883c51f93acf057e41207b2136b73b8c63733e8d72f1db396bfffb11602bc34b787312e2dbfe0955387492362234d09

  • C:\Users\Admin\AppData\Local\Temp\Tar6F3C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Ul

    Filesize

    88KB

    MD5

    f693e3e67b3558189112884e2d51e173

    SHA1

    a48966c8b007bac63b0fa7a7ebd471c9c7ec081e

    SHA256

    1da12e5ce6a1eaaf0dca6d2ded9861ed6c8d911030253e0e569f946a233cdbcb

    SHA512

    27592fd067a0130a040d0f84b11b560d4f8ee7b394b4c05d8f299d085afda3f5c45b62d9a6c69a3a8334513fb5de4322d97886115b90cd8796ead4e690743cea

  • C:\Users\Admin\AppData\Local\Temp\Webpage

    Filesize

    477KB

    MD5

    f5b2133ba05164a30c90e87515b77a32

    SHA1

    c7c4dc5efffb8acf7e840975d37d136143e8d605

    SHA256

    54871a8f4f81284e9385480e22b8f2f6fd9af6ea516eff862ca9997e46100119

    SHA512

    137c23f2364b1c5f2004629c0d31f5e7b64bb9a1556e8d942e46244b19fb2b3e4f35c1b5942112ac48234f3723ea700d193a8aa93698a05c9d751e53b7224bf5

  • \Users\Admin\AppData\Local\Temp\488819\Aid.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1736-73-0x0000000003650000-0x00000000036A7000-memory.dmp

    Filesize

    348KB

  • memory/1736-74-0x0000000003650000-0x00000000036A7000-memory.dmp

    Filesize

    348KB

  • memory/1736-75-0x0000000003650000-0x00000000036A7000-memory.dmp

    Filesize

    348KB

  • memory/1736-76-0x0000000003650000-0x00000000036A7000-memory.dmp

    Filesize

    348KB

  • memory/1736-77-0x0000000003650000-0x00000000036A7000-memory.dmp

    Filesize

    348KB