Analysis

  • max time kernel
    8s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 23:04

General

  • Target

    Discord Checker.exe

  • Size

    58.6MB

  • MD5

    c2d496802f813fa0d09efd0b6f91b977

  • SHA1

    fa4db0473ca9034169d062609e6bb9a045c6cefc

  • SHA256

    415073c534042cf782c00f9ee64f765b994d243a10a9c8d56be84cc45eb8f1f1

  • SHA512

    77268ea332f048d3d461d468abd66cde9e367b79cb47b8227a7cc1aec910c252b5dd77572c31baae491edc52f9da7165c30d9b373ecfb9cdb70b208ebd23abc2

  • SSDEEP

    12288:Dv2YAEaMSpAmzHCr9MQfnKXynbN+e7cExX/r88/gmYFK/6i3G6L5xQrEWxAi1+HK:DW4StY9MQfnlbHXW

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://celosiapatroen.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Discord Checker.exe
    "C:\Users\Admin\AppData\Local\Temp\Discord Checker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\d3d9.dll

    Filesize

    465KB

    MD5

    d0f3c26a388a10cdb38234798c82c2d4

    SHA1

    08d6bb12a902c11f2ed2e9967ad6130cccf37a2f

    SHA256

    62af6db6aea76de519671b868ec3b660f1215c41ffe80af103e1e11eef877f74

    SHA512

    af131d0d0a3d3c51bbcf37757192e36745d9ff849df24a601a001e215cc26419dab8c42c1adfcb8b94a14f896be8ee38aea38571cc0139798d01ca632838adad

  • memory/1888-0-0x000000007502E000-0x000000007502F000-memory.dmp

    Filesize

    4KB

  • memory/1888-1-0x0000000000230000-0x00000000002D6000-memory.dmp

    Filesize

    664KB

  • memory/1888-12-0x0000000075020000-0x00000000757D0000-memory.dmp

    Filesize

    7.7MB

  • memory/4176-8-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/4176-11-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/4176-13-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB