Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2025 23:53

General

  • Target

    installer_1.05_37.7.exe

  • Size

    1.1MB

  • MD5

    f32e38ba72ea905c85f334c46e29a395

  • SHA1

    7ac493eaaa906da24168edc015ea8223563c7e09

  • SHA256

    13d366678ecc0f497d38614b0f29d387e013b8b36bea5aafeb70b7dcc0f35d8c

  • SHA512

    7e1cdf166f1798444a4cff5d47c0c2dcc402ef0d1a34be705222457c355c268cca60caf988be2bfb02066744053b02d6fae0ff977a07f145942d57587d31986b

  • SSDEEP

    24576:l8OBhWF0n7c7GtMTNWkMxOFfcpdvcPi47BkleE/2SCYT41nNzJnVJ6v5kHb7Tb7j:VT72GeTU80pZcq47JE+lzNzJ6S

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://craveinjuur.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\installer_1.05_37.7.exe
    "C:\Users\Admin\AppData\Local\Temp\installer_1.05_37.7.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Repository Repository.cmd & Repository.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2812
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2820
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2668
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2608
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 154687
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2568
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Sn
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2584
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Desert" Larry
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2412
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 154687\Pen.com + Designation + Layout + Degrees + Bobby + Ukraine + Wives + Cooperative + Declare + Pad + Copyright 154687\Pen.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2204
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Sega + ..\Salvador + ..\Sbjct + ..\Radios + ..\Quantitative + ..\Melbourne + ..\Impossible L
        3⤵
        • System Location Discovery: System Language Discovery
        PID:752
      • C:\Users\Admin\AppData\Local\Temp\154687\Pen.com
        Pen.com L
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1796
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\154687\L

    Filesize

    487KB

    MD5

    59def93cb1a1512004c4bfb594a7a282

    SHA1

    edcae4f4f7a3a5ed0df68e0a8d1ec8b3ab2d1e87

    SHA256

    638081202418e3fddb81a47c591b90e0682a869b4ba744e7d87ac0b04f74aa74

    SHA512

    e4fe4323dec50555f544e6e4cd99bccbbc4a8f4585d8d168c89cf2aa3fee555c0e6c0b6d223711398b2228fb154879ac353bb68c95671eb79fdf54d9551623fe

  • C:\Users\Admin\AppData\Local\Temp\154687\Pen.com

    Filesize

    113KB

    MD5

    870831ffceec39322d5c0027d0f84770

    SHA1

    6f5f712ce50e0902dac1a07745f6be1d21dac0ec

    SHA256

    5543d89351939e3ff9cbd3542b57811f09ea4986b5f8f3a22be3b11a55d21bb7

    SHA512

    dc8c19b5b9492ac0a3f2cd5935d9155ffc4ef08a236f0b7d59f9614b30bb13aaafd9f41ef2a33dad93df48956088c7fb2585c22d84a0a0af581b4d9f72e25913

  • C:\Users\Admin\AppData\Local\Temp\Bobby

    Filesize

    60KB

    MD5

    4edd4a8a559c81e9d19e6744543b20ec

    SHA1

    54c8f6b8ec8744112a819166c8664f3f5ddb1d3b

    SHA256

    a2e29537674e0d5e8fe4a81741afb9398399b52866c451d982158662d94ec287

    SHA512

    584ae80567ab9298c6e0b3e53769ac2480a64227fcf1c5eef786741ae4ebcaa96eb7161c779413fb11572534fa22a24a6ab48439239bdd8dbba6bf424faac117

  • C:\Users\Admin\AppData\Local\Temp\Cab560E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Cooperative

    Filesize

    68KB

    MD5

    1a9a4467a45501cdb49c628305c0216d

    SHA1

    f5627d1dc0b213589187f9a1f63405bd3432626c

    SHA256

    4507a39515c4e5a7cecc2114dff940ae2a3c0d2b74dd51e91c6cb92e572cb24a

    SHA512

    620a92890ab493bd3ea7b0341cbf69a2bf06e4b069810cbdf74410ed51c035473470e84b15543e109c15e4b47ac14bbd48d05dd04e629c88801f1b1e013ef882

  • C:\Users\Admin\AppData\Local\Temp\Copyright

    Filesize

    63KB

    MD5

    bd1decd3f3ae98dc7d2437e88fea9fb2

    SHA1

    3ed172ee14c24a12745341a3063b30499cb2b241

    SHA256

    226d40209838b302f48103b5593cb1acc718f07d51fb0ba170bdc3ec6e5c26ee

    SHA512

    f85890604f86e2c83ba2a3d6fdc7f8f1dbec7f83e97f961635845464fbd739c51db35c16f039675c081998896b8136bfe90fc1c5d0b821b361511e2418918e02

  • C:\Users\Admin\AppData\Local\Temp\Declare

    Filesize

    104KB

    MD5

    d4c85012518dd13aa8d1e1d6ab661095

    SHA1

    f9f02e3c31a3ef9e0adca1286d41afab009c398c

    SHA256

    2f57a815c36dadb7984ff1fcf80278529e1d0f8122c171c03a99eb1d1e5b0b5c

    SHA512

    64b4f55f62aafe7cb5cde1cc836cd87df52b7f59aa70a0f4c70a67dbad362b67b0c676dd55d466e8c7f8a6471bc71e4efe8a2990784c957fa8abe4b2fea3128d

  • C:\Users\Admin\AppData\Local\Temp\Degrees

    Filesize

    107KB

    MD5

    f4b6edef831e27512138ec9b75181ca0

    SHA1

    cd603bb5edd1f869d85d406855355cf37e12659d

    SHA256

    f724f0b9df9d0cab2b558d5d6802f02f8981877073392a7ac3c54768707b9c04

    SHA512

    645465a6790ef7f77d0e606fb5a366ab662f5c09b8bc38de949c1cbeed6bd4b38edf7313bded776c2f452f3b03505854fce3c75f2b4309a16a6beaab37da9e69

  • C:\Users\Admin\AppData\Local\Temp\Designation

    Filesize

    112KB

    MD5

    4530889c9770be7cab3ba3bc3a79cb2f

    SHA1

    6af39f6f4cfdf6744d1adbaf47e61d3bc8c95255

    SHA256

    1d55e85ca4068e57f1d22a73c874a42f70a3d5d7bef09e7dd8966465c2ecd2c2

    SHA512

    834778cb2653aa0c57e8aa7999375e3f81c51a651d3c280b6e32c372beedd47f7ff820b742a7f3e05b5fdf45e9e31e346f3b30f07a3ac8359823c1a41ee47ea1

  • C:\Users\Admin\AppData\Local\Temp\Impossible

    Filesize

    26KB

    MD5

    bd63db3e0a1dc2298e58d930a5d04900

    SHA1

    ee0217fe7d5740c697d3a78bf131b40077484023

    SHA256

    8cf288c804b5098a3d4e3361f0c1095c8305ba6b94739b0942e96a42bd33d450

    SHA512

    6c858c894778c024bdf0ca86dbb2c0388ade776c11c6c5f6fdbeccc7505b86f0adc72e166abe608ef6ea182d49f42cb61f3d230fd9e586b044bef8584e3198e6

  • C:\Users\Admin\AppData\Local\Temp\Larry

    Filesize

    1KB

    MD5

    5ea16a509391999338305b7687b44618

    SHA1

    002c58ab50a6e1067bd1bc07db88325c401432c5

    SHA256

    2d38781d71e99589828f3d3b4ecc4a88e4bca7430f15a845e7a8f73d75a15c88

    SHA512

    5e8d890a8861e4c9eb8cad999dfe80973db51cfcbd543ac94d08f83f803bb8c71f104a84241b0f19af7b144b11abfc481f8e113f0c50f1c9703413ff6927d457

  • C:\Users\Admin\AppData\Local\Temp\Layout

    Filesize

    122KB

    MD5

    919bd0b3be6b880a8fb876e4e3916be7

    SHA1

    bf1b811bf15f3a6b0bccc7e6a8fc1daaeb2b3ea2

    SHA256

    650d394809c2755396ae199c31342eaece684c3a6c75664d771f0be494310ecc

    SHA512

    6d0ec1cb367001c8b4b05303621451c1ec23c8c1663bd262d96457f94f234e8161c7d4e073c9094757e1225c98edb1401f757ead8117dee47a51af526398319a

  • C:\Users\Admin\AppData\Local\Temp\Melbourne

    Filesize

    64KB

    MD5

    4756753aa7171f3fe996dcd816569f38

    SHA1

    995c693333bda65b487870bb0018696b282b9a92

    SHA256

    8c6c62d5c8fd4cf7634452950789e1cd6d92003ca77d75f73240e30fe2000832

    SHA512

    798c93ac1ef8bcbfe0f3a1df1bfa5bc36fc8ffe69d7388e80463a34f318d139e9b450292a26886caf4ecaf3a7359cf39eebcf842051b40f60c5f83ab1dca8ca6

  • C:\Users\Admin\AppData\Local\Temp\Pad

    Filesize

    114KB

    MD5

    1ff8986202ceb85ceddb24245cf46f0e

    SHA1

    0f64e48119b7392aaa6ce0f0efbe719f65862f08

    SHA256

    f298aa9a20441d80090b49f3f20c07b9c77d7d30fbe1e7ba1e02bb6d19d92716

    SHA512

    aaad9633eb93dcbcea8832c22b9fcfa63a27a28cff9c0ff301a34ac1315555c9d06e0d6bd00b4f9f7ef00e9ea13e3cb765930a010671cc0bba30dc485af7c1d7

  • C:\Users\Admin\AppData\Local\Temp\Quantitative

    Filesize

    63KB

    MD5

    4f05948ce5a0279d54db0c071b0ca4dc

    SHA1

    f54f5d524742a8a56e07edff782544fcbea269a9

    SHA256

    97aa4622af630e731c0c0cb786a9ffdb9f8c646488306025feef6d590da2ed5a

    SHA512

    847da5602d78b2693d6128d1d6199966754caf316801c8ee5cffbdc9f1d5a524cc9a1e094fb49e15456f35a282d3aa6e6c1cb367e1d1d128924ef299a4fd48a7

  • C:\Users\Admin\AppData\Local\Temp\Radios

    Filesize

    82KB

    MD5

    ebc4f8328517a26721545339b8be17d6

    SHA1

    7ce4607b5d5dbd584346732f4eab7d93041337bd

    SHA256

    59323c26479be9a8a74314a750e309ec44d97e16b5fc0aab14b03ce9ec23fab0

    SHA512

    4b4a541098b7697c16a6d3335de4d7d7fb95e9ae3983d7483fc9a0b2db204bd0c1aff74a04fd2f777cc7ad79cdde71a216e6f9094a8f67f97a69bed1c5c337a7

  • C:\Users\Admin\AppData\Local\Temp\Repository

    Filesize

    31KB

    MD5

    233291c9fb2e2e40628fa2056994f944

    SHA1

    b103e3a9af21be1b6dba02006bc66c2ec0f3b399

    SHA256

    b6a94125899a2048f9e9da05684730b3f695054d00ca91ffea3f19a280411127

    SHA512

    c2a080bb457e736f08a6d2007df437b4b8e0a5a8d10917c220bbe3da3b48b22f39176ea8284c743256c39f3a7f73bed2ab522456ef4eaad1281be9eb2831149a

  • C:\Users\Admin\AppData\Local\Temp\Salvador

    Filesize

    84KB

    MD5

    142a86dac71d1d3449774565746b7fe3

    SHA1

    667864a5379ec0d012b5dfaf7b8555dbbd4d38b1

    SHA256

    21a42db29aea15953176c23825b104cef633e754557d7e8baa5166c2a7b4113a

    SHA512

    b34988f6b7a8b75a08d60b5d145d410958349afc1a88c1f79e70d51f947cb060576efe3ae9caf96f2caebdf82e03e8d0764284c14eabc018720dbe4a9c43a966

  • C:\Users\Admin\AppData\Local\Temp\Sbjct

    Filesize

    86KB

    MD5

    d82f7cc7ee8e2ba26ab69ff45afb9e97

    SHA1

    760676c3d81ed776cf62251e956a3d7295f7c758

    SHA256

    40af2fa26240c8ce54610f546bde1b9366a68a16d3ca546bc8695740fa9fe476

    SHA512

    4f83712bbaf3fb8644caa841adb3d6953f252ad863cec17202ba8a799262417a608f2d8445173b5605f41b25d68fa751be387716b8bef54181dca35496c1cb89

  • C:\Users\Admin\AppData\Local\Temp\Sega

    Filesize

    82KB

    MD5

    6bbef2129e641dc1f8c17eb4acd56e88

    SHA1

    2957ee1505bb3470d1a7776f61762193605b7e9d

    SHA256

    4cadaa0c2df2b0fac0ac530683c514be00ae14161bd8a6cb36767555482d29c3

    SHA512

    8b8047bd0715a8c7c507273fbf982049e8998dc54b62c448fb4b7e80a4722f10317f77060b1b4ab482d7ca1759a7e7a3b4687d1e9c26e4ea89d3df95cb7dec25

  • C:\Users\Admin\AppData\Local\Temp\Sn

    Filesize

    476KB

    MD5

    b4c1d119b71b93bd9f440e48e9ae1c2e

    SHA1

    fbd1a428124a12b6c2a992cea5dbfb9673f97395

    SHA256

    3b5a65c4a251a30ca34748eedf2f0ff1c61846af7050402f775e23d6f5022b27

    SHA512

    2a523ebdb8477f852b865436f43044efaaea181dc40455e9fd1e82e9c165342d7e8729ce1ae59cc2139456cd8b51a0822c94bfe8a10227c0636dd1bd3421a327

  • C:\Users\Admin\AppData\Local\Temp\Tar5621.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Ukraine

    Filesize

    63KB

    MD5

    c8b9ba6bf2a2747e23a3f72a78e1a4ea

    SHA1

    5c4ae07ca6be5771e59c06ccc2fce94424a1dbbd

    SHA256

    78e6d3bede414d9510bdff9508412af662228bd81eac1b49168cb995b950863b

    SHA512

    94212c48e2e91fb568399661385f8779ece52876f1f47177a88e1e0f99337442bf9090694f49a76e95ad23be017c3be4219b815d566798b53fd4f97d18ee700c

  • C:\Users\Admin\AppData\Local\Temp\Wives

    Filesize

    110KB

    MD5

    7002eb16f9828e978431b3773ea71113

    SHA1

    5b258a1e779acc8f70df93ad1166f175af8663c2

    SHA256

    a4e4467f254186c8c96095478cc2b416732083e92e98e84aeccc5ec5bbded168

    SHA512

    36e9b2c44d2d6fc2a8ffe5db55d846a54a70783c384bbc7bf28b5dd8c425ebd14d4e8e924483eba3750890c635951c0065fb2f79e141a378c71542d1339e8c9a

  • \Users\Admin\AppData\Local\Temp\154687\Pen.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1796-72-0x0000000003B10000-0x0000000003B67000-memory.dmp

    Filesize

    348KB

  • memory/1796-75-0x0000000003B10000-0x0000000003B67000-memory.dmp

    Filesize

    348KB

  • memory/1796-74-0x0000000003B10000-0x0000000003B67000-memory.dmp

    Filesize

    348KB

  • memory/1796-73-0x0000000003B10000-0x0000000003B67000-memory.dmp

    Filesize

    348KB

  • memory/1796-71-0x0000000003B10000-0x0000000003B67000-memory.dmp

    Filesize

    348KB