Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2025 09:10

General

  • Target

    2b8bcef4db3812c27d540f4cc146879a.exe

  • Size

    44KB

  • MD5

    2b8bcef4db3812c27d540f4cc146879a

  • SHA1

    fe5dba4ff84a9f4b8eb409d15c69d74bd48fe8d7

  • SHA256

    e3fc82016d019a3879b3ebace9b949bc38212447e3d1775e618a57ef982b41a1

  • SHA512

    1688d760b33bd4588b2f3aee94db8a32ff2fe5c390ddc1e868f101bb776e2c5055e67f6564dc66ae96d134768f31159f839e58df1669b9e2c3f9e93b712bd6cb

  • SSDEEP

    768:Srn01NSVwafevGHkiV++I1gqDnJuuAuznQVLNvxu0BvkwIt6BcN4fehnXn:Sr01N7aeGEk+11Tu9AnQVLNppvk9RN4s

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Downloads MZ/PE file
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b8bcef4db3812c27d540f4cc146879a.exe
    "C:\Users\Admin\AppData\Local\Temp\2b8bcef4db3812c27d540f4cc146879a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\22us3lhk\22us3lhk.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3096
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE927.tmp" "c:\Users\Admin\AppData\Local\Temp\22us3lhk\CSCF1263CE17F4F4AC9B735851CD9DD63A0.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3268
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
      2⤵
        PID:3840
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 560
          3⤵
          • Program crash
          PID:4496
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3304 -ip 3304
      1⤵
        PID:4688

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\22us3lhk\22us3lhk.dll

        Filesize

        8KB

        MD5

        74bfcfc20ae97249d67f53dea8739893

        SHA1

        5bd3f4191b270927d7da9c6b25b1c8b947d97fcc

        SHA256

        604cf3ad1769528760efd1e179848d2fdc28dc179c17f130546e954d7c146469

        SHA512

        c5686feb0646f924ebde884ea2586f84230275352910fad0b1d609dc0c6f11f933399f32d2107c95856ab7a3a37d450c4ab0399e8eb4297310b88d2583de8887

      • C:\Users\Admin\AppData\Local\Temp\RESE927.tmp

        Filesize

        1KB

        MD5

        05d571416defe99c2fcb31570f12598f

        SHA1

        d5f6ac7687c503d4795dc11912f4cfebef182804

        SHA256

        cdffc1ae455cee87421662c2ab46c7b35ecca860458dccc8ef2b301137ae8087

        SHA512

        9ebcfb6108a6ada46c8519c2ced95f736e09a850062c648393160686006799e5dade851dda651e8769f568d1bcf47341e456db87dcb9fcb978ca662e91254916

      • \??\c:\Users\Admin\AppData\Local\Temp\22us3lhk\22us3lhk.0.cs

        Filesize

        10KB

        MD5

        b022c6fe4494666c8337a975d175c726

        SHA1

        8197d4a993e7547d19d7b067b4d28ebe48329793

        SHA256

        d02016a307b3e8da1a80c29551d44c17358910816e992bc1b53da006d62dd56a

        SHA512

        df670235e87b1ee957086be88731b458c28629e65e052276dd543be273030986a7e5c67fa83587f68ec06fa0f33b0c3f1f041c2d06073709b340f96c3884f2b9

      • \??\c:\Users\Admin\AppData\Local\Temp\22us3lhk\22us3lhk.cmdline

        Filesize

        204B

        MD5

        a0c9ee3381b1e9116aea8b2d9dcf97cb

        SHA1

        dc84d0806aced3044d228c7b799db5262e2e5684

        SHA256

        311ff59c3d4504ac4397044f7cb730edec6a1c5da59dc507346607a808a401da

        SHA512

        3891007ed1cdffde711faffa42eb5afe1a61306cf83f624f8dc9f68c9ba611cbba792930c24723ef3e0d56224d875c8409148d450134eefbc4bff458dbf1755c

      • \??\c:\Users\Admin\AppData\Local\Temp\22us3lhk\CSCF1263CE17F4F4AC9B735851CD9DD63A0.TMP

        Filesize

        652B

        MD5

        94a2301e2a6804383ff8682a3ee4607c

        SHA1

        13919ab45ea91df29c012353c5d8d30c0cd6155c

        SHA256

        4e210c14115155385f2aaee7a3de42b53d246000cd561f2a197d54e626ee6380

        SHA512

        9cf813724f828609fa5babc2273f947a61b3e480a89d03c2abd886a6e7c8e279d91032840ec47cbc36227716dc6b2b9d2cb77731c54bd73f29e5db9b4a412cd5

      • memory/2612-3-0x0000000074C7E000-0x0000000074C7F000-memory.dmp

        Filesize

        4KB

      • memory/2612-4-0x0000000074C70000-0x0000000075420000-memory.dmp

        Filesize

        7.7MB

      • memory/2612-0-0x0000000074C7E000-0x0000000074C7F000-memory.dmp

        Filesize

        4KB

      • memory/2612-2-0x0000000074C70000-0x0000000075420000-memory.dmp

        Filesize

        7.7MB

      • memory/2612-1-0x0000000000730000-0x0000000000742000-memory.dmp

        Filesize

        72KB

      • memory/2612-17-0x0000000005A70000-0x0000000005A78000-memory.dmp

        Filesize

        32KB

      • memory/2612-25-0x0000000074C70000-0x0000000075420000-memory.dmp

        Filesize

        7.7MB

      • memory/3304-19-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/3304-22-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/3304-24-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB