Analysis

  • max time kernel
    30s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 21:36

General

  • Target

    appFile.exe

  • Size

    840.2MB

  • MD5

    7dd0d3444b537ef8704c5ac73b563fbb

  • SHA1

    74f340b5eebef348ad0e3d3edd366302db6ac51f

  • SHA256

    82d57c41a165dc862edba9cc2e99bddce7dcb1301aa38f84d2fbf50015f06a63

  • SHA512

    d507ca19a60fd52c981f0bd175acec29003237bfe7df08e921b1a44981f4d1c404a61108d280783edf845eaffdc409210e269944f0977a8514f0cf87f4b37a67

  • SSDEEP

    393216:ECkCJ5qb7gZO3Cpmyv6oXhZNgzYv7JjeN5uw72nLapUbzTntpHS:+NgZOSCC1TJjm/UjHS

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://impolitewearr.biz/api

https://toppyneedus.biz/api

https://lightdeerysua.biz/api

https://suggestyuoz.biz/api

https://hoursuhouy.biz/api

https://mixedrecipew.biz/api

https://affordtempyo.biz/api

https://pleasedcfrown.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\appFile.exe
    "C:\Users\Admin\AppData\Local\Temp\appFile.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Appendix Appendix.cmd & Appendix.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2272
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2236
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:584
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2296
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 334921
        3⤵
        • System Location Discovery: System Language Discovery
        PID:844
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Beth
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2476
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Andrews" Uses
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2496
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 334921\Investigated.com + Vanilla + Tide + Occasions + Older + Gaps + Spy + Impression + Apparel + Baseline + Worry 334921\Investigated.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2628
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Hb + ..\Effective + ..\Subscribers + ..\Friendship + ..\Sally + ..\Ha + ..\Carpet G
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2432
      • C:\Users\Admin\AppData\Local\Temp\334921\Investigated.com
        Investigated.com G
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1008
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1412
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\334921\G

      Filesize

      479KB

      MD5

      8eefb18e94a1cc30768d3b002f059ff6

      SHA1

      f6abc9c5d35ac04e768778415905ccb92a8443d6

      SHA256

      abde15d3b5763ddf11fa2c47e48cf13ba7b4cc25d72fec4e52a11bc8473faae2

      SHA512

      f894f1d3bfb8b9108daa5fd131d3451ffaa76cb85eb9ed79ce179cfcc7f58d933191f6145f1f1c71f47443d6a8310a8202ed130bb3234eaadc83a37bc812e064

    • C:\Users\Admin\AppData\Local\Temp\334921\Investigated.com

      Filesize

      1KB

      MD5

      86e10068304327984b67e3f375bc82ac

      SHA1

      3a061a7133a5f7a1e4c748cbd17e30d2dd25fa31

      SHA256

      fe4b5f561dd05ddcd0a3685072ed114fe03cfa6e9bbe54ecbe49059e6097401c

      SHA512

      70eef3cf9b8a60a768b25118863ce681fc8868b544214d57c71ca25026a57c93d780583d37e59dc2d6818a9f88fdaa65b69935fbf35232e16417f20756b5ecd0

    • C:\Users\Admin\AppData\Local\Temp\Apparel

      Filesize

      58KB

      MD5

      a222109d935bd516641dfd1f2f9b14e4

      SHA1

      a9f68234e8087a914d5ed08484dee07c8d4d4096

      SHA256

      ca589a07659bd741cf0c3b93451a9fe3ab72b987045bb9fc0d4c54dd0a59adba

      SHA512

      dbe96164e69c1886e94aff3460d103aaa070b9d022b7d26c28f52485cc87d63ce3c975b0a1cb79bd349e6ed767e67831de19679985c2819e9d1a95296a94ae63

    • C:\Users\Admin\AppData\Local\Temp\Appendix

      Filesize

      27KB

      MD5

      24934a7642d54c8b237f157c5913f0e4

      SHA1

      0ae77471424e35a0eeb6c3e77f07bad418583f2a

      SHA256

      1647eefe80c44cc3cd492d79aa90c7e139d9a7cf446dd602808c82e87d92cd92

      SHA512

      8ac8b833cec7c1511ac7a34ecc8d3ea3b8e4b6fcfc4c73c63d6d8449834eecac2bb2abdde936cdd7461d99e2a0c9431afb58d4871b2b359ade109adec60c9c56

    • C:\Users\Admin\AppData\Local\Temp\Baseline

      Filesize

      73KB

      MD5

      7167a19b93647a7bafeaa7213571c7b2

      SHA1

      b02e41d1aee3cf47f24ece668520bf4b874d2536

      SHA256

      762274e69594a25713d719fbc46e7cf82a032262ce100b95df81aa793dca634d

      SHA512

      860b467c881e16ab776f80514fa3815ca31f04833b8e2530c3b12f197ce1b8c0f879092ff0d0fe71d1407a4ebd954eafdbe97463d8c1cb0ea628b556252b2384

    • C:\Users\Admin\AppData\Local\Temp\Beth

      Filesize

      476KB

      MD5

      e48014553aba2d7dac0be7eb36bfe785

      SHA1

      613d0c6b679b0f8d16a6900860af289dda1d73ba

      SHA256

      5f38d02e1cca14a5d51543b2a3d7ed95a0c189f986f80c5c413dd8a1e365b62e

      SHA512

      b97037c6bf0d792de40ab6caf7c2bf01fe3064caaac884999badbf44d8a12325e8d816c408f9ad06d15c4785df427fe0ad78408aaf880ce4c5894b409bdd73e2

    • C:\Users\Admin\AppData\Local\Temp\Cab3F44.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Carpet

      Filesize

      50KB

      MD5

      a9db8c35eeee657de659e9fc5bd3c4c7

      SHA1

      8f2eb37b6f84ac8dac51302757409a3d23ef2c6f

      SHA256

      6624d92e8a10589c3f4204fe948195190e19a29df4bc267febf4ce785df8fb06

      SHA512

      587601a4acd55887a321d42fcfbc295be8344521a2957a16110013bdfc7494789857d3d71a85082b97f39ecaeafe334f726ccebde85629f53d2aa85c8a97a340

    • C:\Users\Admin\AppData\Local\Temp\Effective

      Filesize

      97KB

      MD5

      563415bdca0e2a6b63ea351b29a93e97

      SHA1

      b760d2f7c472c08ffa5a746d23978d50007d7c02

      SHA256

      0263984524438816230bbd117a9617af7210cc5b7181370146199b8bf7b40b16

      SHA512

      ba51a2f3e6f9dddfe67877391cdaf068e689769df9661e138da12cb1fcedd24a1938117f22b418a5cf8aafb6500d4e9d038f92fea77b9dac64d4006f7134bb6c

    • C:\Users\Admin\AppData\Local\Temp\Friendship

      Filesize

      57KB

      MD5

      0a6844daad5ec8c3566e78cdd899a90a

      SHA1

      4bd0d14e5d68a56c513f8f5c35a6ef077af3d341

      SHA256

      b18793f220418e0de5bd812b48e06534f1c1cc3692b285a33b049b56bdad936f

      SHA512

      8baac59574ddaf5ef6feb01d6520a2d540532c1aa39c356f4a211ab82a35a0c606598e496739ad761bb1a0f26024cc6ac3fb22e31c5d7dee0228fb29ff315ada

    • C:\Users\Admin\AppData\Local\Temp\Gaps

      Filesize

      97KB

      MD5

      f9af86377e01e622f05f4ae5a96189bf

      SHA1

      e8430bfbc931639e32a5cf241ad7089aecb35b22

      SHA256

      bd913f15dbed663728bdabdf4926ca97cbea0c21604459a4aa3082503f5073ee

      SHA512

      b26b0c9692d94cc5e005737a7965ce6c9ce190df8497f0e9e44ef7fe0fed2c305855c2a2d690183d336252b3e7a75dc181fad75afecac2e659769afeb0eea85e

    • C:\Users\Admin\AppData\Local\Temp\Ha

      Filesize

      60KB

      MD5

      ab3a493ef57c4d349e765e618e694b51

      SHA1

      faa55cf7b56a663eb3e9ed597af2ca927ede9bec

      SHA256

      84b6e4d81ae33f40d7d61be4b7e31b63b977f484be791675105ce42ed9e97dcd

      SHA512

      d303740ff615c7491dd49dda8acb17de1996790a7ab75cd4a6e176eedce7842ffd7fbd631a0c95543a016999315f99cb9ab6b21406ca594aa46eb6767d3d0ae4

    • C:\Users\Admin\AppData\Local\Temp\Hb

      Filesize

      50KB

      MD5

      ee7dc49e1b77bd5949cf97344a4aea95

      SHA1

      13c37e3df74773d6fe92b9631b92cee2f983c293

      SHA256

      c1c07b7b81b9659798a5a3fa6f69c16bc5203121d280a0ee0b919a045978c0e8

      SHA512

      a224775971aa60b2a2cf7d1448e5f72e41b7394d21744cc6cb4e16ee930bf5e46aca1daa115e9f8824e232eee32682018a9b00181d9a48f890ef508d6d9313f4

    • C:\Users\Admin\AppData\Local\Temp\Impression

      Filesize

      81KB

      MD5

      2d72fcda3ea81a29026eb125bf8c8684

      SHA1

      3cd6391940829732da5070b4ac9d94eb7e89ff80

      SHA256

      b27965efc244816d53531784756bc3c5ee62776bc2900ed856c28dd65ab8fe94

      SHA512

      7f6178e3e6858d7bfed03d4e79e96fb3e70f7f2eb7e5216f3d8b5acada4f70c645e8ad7d4873b5e2bdd034ded3fc483afff0908b776780a3708e9a1a77233d0b

    • C:\Users\Admin\AppData\Local\Temp\Occasions

      Filesize

      103KB

      MD5

      96ed109abe2a0a7fa8892222826cb8f3

      SHA1

      ffce58f0191743c13f38683bf178163be8cc3188

      SHA256

      4f23cbd9fda07352d1403d5341e06c73031c9d912c04f171e30c1b09d06a0922

      SHA512

      444d8aaa1afb9a3be92a9cee5901a978d78b586b6350eb12110738a5cacbc70ff949522bcf08902a3095a6917cad2163e4ca101c36aa59dd68a2c5b8e5fe66b0

    • C:\Users\Admin\AppData\Local\Temp\Older

      Filesize

      97KB

      MD5

      524a3836f99a49c1af1a7a4e07510154

      SHA1

      df2bf90066eb713e5634bf0efbfb408fd5e43074

      SHA256

      af38d4aaab963339304f30ece2c53273a1f4b271a459f57039786f67cf2a9d14

      SHA512

      6e0aeb754e1066a5f334b861a81b7d08f7f816b4f8afb5d84792293700de4e76b8aa9334d020ca9864af6b85fe0b4e13736ab6e822e3029dc3648307d3ea5ab3

    • C:\Users\Admin\AppData\Local\Temp\Sally

      Filesize

      83KB

      MD5

      b124dadeaedf8fcf54d446b625f34373

      SHA1

      6a0634a6db6eec977211529caee94252b31c8f0b

      SHA256

      e21f93c1354098f70056cd64c74bcb825d497aa048f24f2b12ce0ed977159d5d

      SHA512

      697edcfa185c509be96c0c8386137fc0c18847ccf64a8dd04f7f4a75ff0b4421391c34666e61539e61cca08a23811e9ba3a9b0c6e265b9874ff365b848037ae1

    • C:\Users\Admin\AppData\Local\Temp\Spy

      Filesize

      97KB

      MD5

      26860801a42a6c5ea4bd16801f83aa3a

      SHA1

      bd410a4babe041bf37aafa18206ac39cc30af224

      SHA256

      5a64159e9a8465b0b9b664f7dc53b883bd7ea4c5b1345bbbc44feaa2b6c5b99f

      SHA512

      da9a4f008be4e4b91ef8d8531fc04a076cc30a3f9e66c80e6ba04a0fcc3763e70b539a77bff037b3261f6e0bbbc5c57ae5c7bfce50ece4e5f8f46e2a4516e108

    • C:\Users\Admin\AppData\Local\Temp\Subscribers

      Filesize

      82KB

      MD5

      9b4706c67f0c4c0d6bfc23bb444c69d6

      SHA1

      2cde865f051d00b47458f8200621b5e489b9e74e

      SHA256

      c8bf325b84957bc409503998736967dbae8118a4a33273e7dc5367c3b30590ce

      SHA512

      40a8e0c1f6573d04319df09233037d21cb3b1ace7cd195d477ba5f230b00d9f4db29986181a3356385ba481d4bec6365bd8bfc1fa9bdf4af8105cff473dd3966

    • C:\Users\Admin\AppData\Local\Temp\Tar3F66.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\Tide

      Filesize

      138KB

      MD5

      4c787015e04d5f2fe9db04e3b1123c32

      SHA1

      50df223f98e44830673ec9ff8c41fbba4af702b4

      SHA256

      bc92deff67095787f608fda78b29f6b03c76dfd4defdde5c90bcdf95a3eaf31d

      SHA512

      3ec78bf7fb9f64e1dba179577a006147f1983ea243f12a4bada52a493832fb71d9d94d351e3e24fdd05e4bf2eeb2520fadec7d63542b567befba5396081e23db

    • C:\Users\Admin\AppData\Local\Temp\Uses

      Filesize

      1KB

      MD5

      6d0c1546efde6d812b0444ba06a5181d

      SHA1

      af3618ec9e295d69845da168d3947a2c2a55f0e7

      SHA256

      d4ec10db0723d5f1fff678cd35e196d702cc53e8f87ade2b7ed8c65af29b2304

      SHA512

      92169b568ccf9d8cecc333939d0e4ffbcff0c4bb143298537b9da36aac4f30b3124a2b4744bc2bbef6c33473cedc0ffbe46db540856cae9b5e27c9094c966b45

    • C:\Users\Admin\AppData\Local\Temp\Vanilla

      Filesize

      82KB

      MD5

      caed81ff7344c3bbc33652e994cca636

      SHA1

      98daea116e08c2e266be6e6156e6a87d21fe73b3

      SHA256

      35b3c1f21633c5b7c9303f929073e661102e817d814e2badd6beb0843bb5363e

      SHA512

      047d47670a9c7ce699334cb833323343b2cebfb3685a84f05be269ce5c56e865e191d3e1bc16fd46febecf7c44945eb0806a3b2e9087d25ed2964ffaa4b0a100

    • C:\Users\Admin\AppData\Local\Temp\Worry

      Filesize

      98KB

      MD5

      76b27db172dc6ce6af12dabfc6d5d443

      SHA1

      24b073bfbf90bb2b22062514f5ddd6c892457dfa

      SHA256

      f277ac9f2b278856c4e94aa802921b6c593854e6780c1cf8a74f8f248061bc70

      SHA512

      9bee3e8af824173c4575253df7c0474ec19a86a3ea509d5c3057f2ad5a4a38e576c84c38ce156cc86bcd7722669766bfc456e64cb62346943a4ddbfdd864f686

    • \Users\Admin\AppData\Local\Temp\334921\Investigated.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • memory/1008-658-0x00000000034E0000-0x000000000353B000-memory.dmp

      Filesize

      364KB

    • memory/1008-657-0x00000000034E0000-0x000000000353B000-memory.dmp

      Filesize

      364KB

    • memory/1008-661-0x00000000034E0000-0x000000000353B000-memory.dmp

      Filesize

      364KB

    • memory/1008-660-0x00000000034E0000-0x000000000353B000-memory.dmp

      Filesize

      364KB

    • memory/1008-659-0x00000000034E0000-0x000000000353B000-memory.dmp

      Filesize

      364KB