Analysis

  • max time kernel
    93s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 12:47

General

  • Target

    3d3e71be5f32b00c207e872443d5cdf19d3889f206b7d760e97f5adb42af96fb 2.exe

  • Size

    1.3MB

  • MD5

    4d95514b132a4e52abce93e967b54d6d

  • SHA1

    4255b513bdb0d042f18348131cc0fe5a0976716d

  • SHA256

    3d3e71be5f32b00c207e872443d5cdf19d3889f206b7d760e97f5adb42af96fb

  • SHA512

    513dda64553fdcc8658b776c194423e842863fff6aeda2565ed8796a6380c80df148afbf717f8a9173382abe43cbb0c9430dc2d1baada777ecf9175b587c4dce

  • SSDEEP

    24576:EaRaQChlq2VITKd6FRjxuhZc3D5OMVubzFacYhcbi7WCMGYO1gH4oZjPa2jYN91V:zYQgljbkxu/cT5LcvFhoWX4U/g91V

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://woebengeoszis.click/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\3d3e71be5f32b00c207e872443d5cdf19d3889f206b7d760e97f5adb42af96fb 2.exe
        "C:\Users\Admin\AppData\Local\Temp\3d3e71be5f32b00c207e872443d5cdf19d3889f206b7d760e97f5adb42af96fb 2.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2764
      • C:\Users\Admin\AppData\Local\Temp\3d3e71be5f32b00c207e872443d5cdf19d3889f206b7d760e97f5adb42af96fb 2.exe
        "C:\Users\Admin\AppData\Local\Temp\3d3e71be5f32b00c207e872443d5cdf19d3889f206b7d760e97f5adb42af96fb 2.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4508

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2764-0-0x000000007526E000-0x000000007526F000-memory.dmp

      Filesize

      4KB

    • memory/2764-1-0x0000000000EF0000-0x000000000103C000-memory.dmp

      Filesize

      1.3MB

    • memory/2764-2-0x0000000075260000-0x0000000075A10000-memory.dmp

      Filesize

      7.7MB

    • memory/2764-3-0x0000000005880000-0x00000000059A8000-memory.dmp

      Filesize

      1.2MB

    • memory/2764-4-0x0000000005AB0000-0x0000000005BD6000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-5-0x0000000005CC0000-0x0000000005DE8000-memory.dmp

      Filesize

      1.2MB

    • memory/2764-11-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-19-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-67-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-69-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-65-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-63-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-61-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-59-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-57-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-55-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-53-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-49-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-45-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-43-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-41-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-39-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-37-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-33-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-31-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-29-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-27-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-25-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-23-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-17-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-15-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-13-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-51-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-47-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-9-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-35-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-7-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-21-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-6-0x0000000005CC0000-0x0000000005DE2000-memory.dmp

      Filesize

      1.1MB

    • memory/2764-1328-0x0000000075260000-0x0000000075A10000-memory.dmp

      Filesize

      7.7MB

    • memory/2764-1329-0x0000000005F20000-0x0000000005FA2000-memory.dmp

      Filesize

      520KB

    • memory/2764-1330-0x0000000005FA0000-0x0000000006020000-memory.dmp

      Filesize

      512KB

    • memory/2764-1331-0x0000000005E00000-0x0000000005E4C000-memory.dmp

      Filesize

      304KB

    • memory/2764-1332-0x00000000060D0000-0x0000000006162000-memory.dmp

      Filesize

      584KB

    • memory/2764-1333-0x0000000006170000-0x00000000061D6000-memory.dmp

      Filesize

      408KB

    • memory/2764-1334-0x0000000006D70000-0x0000000007314000-memory.dmp

      Filesize

      5.6MB

    • memory/2764-1335-0x000000007526E000-0x000000007526F000-memory.dmp

      Filesize

      4KB

    • memory/2764-1336-0x0000000075260000-0x0000000075A10000-memory.dmp

      Filesize

      7.7MB

    • memory/2764-1337-0x0000000075260000-0x0000000075A10000-memory.dmp

      Filesize

      7.7MB

    • memory/2764-1338-0x00000000059B0000-0x0000000005A04000-memory.dmp

      Filesize

      336KB

    • memory/2764-1339-0x0000000075260000-0x0000000075A10000-memory.dmp

      Filesize

      7.7MB

    • memory/2764-1343-0x0000000075260000-0x0000000075A10000-memory.dmp

      Filesize

      7.7MB

    • memory/2764-1346-0x0000000075260000-0x0000000075A10000-memory.dmp

      Filesize

      7.7MB

    • memory/2764-1349-0x0000000075260000-0x0000000075A10000-memory.dmp

      Filesize

      7.7MB

    • memory/2764-1350-0x0000000075260000-0x0000000075A10000-memory.dmp

      Filesize

      7.7MB

    • memory/4508-1351-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB