Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 16:28

General

  • Target

    New folder/Set-up.exe

  • Size

    86KB

  • MD5

    3bd79a1f6d2ea0fddea3f8914b2a6a0c

  • SHA1

    3ea3f44f81b3501e652b448a7dc33a8ee739772e

  • SHA256

    332e6806eff846a2e6d0dc04a70d3503855dabfa83e6ec27f37e2d9103e80e51

  • SHA512

    7bbb3f3af90443803f7689c973a64f894fb48bd744ab0c70af7dfa7c763354dc6f67a7fbb7053d38b0c6611b0aaa532e73eb2579c1445b8a31c573f8bf972a67

  • SSDEEP

    1536:EU5EG5XI/6POYy6SAi11XFDwYVyjThxXeZBHl+YMk8iVbNuissy:95EG5XI/SOOQyYVF9l+DkvVp6

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://wishbusher.click/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New folder\Set-up.exe
    "C:\Users\Admin\AppData\Local\Temp\New folder\Set-up.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Roaming\Context\XAWSOHPKKQMHBTRXQ\Caller.exe
      C:\Users\Admin\AppData\Roaming\Context\XAWSOHPKKQMHBTRXQ\Caller.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1744
    • C:\Windows\SysWOW64\more.com
      C:\Windows\SysWOW64\more.com
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Windows\SysWOW64\msiexec.exe
        C:\Windows\SysWOW64\msiexec.exe
        3⤵
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\32c451a2

    Filesize

    5.2MB

    MD5

    1eb36a5e12d3e0317e5f113617c588df

    SHA1

    03fa2fb7d70a83caa8554eae5f06ca8615e16634

    SHA256

    7d6889c7ea3f2961de5b493d676c05c17ea42aca7cd49c3be0c76a9f6ecc0634

    SHA512

    7ac80413cc1f9e7ae67bf055e0ad593ea73011a2f37d3f612839f9ad11e38b057de35c4855b39067b857930f8397d44766f545f280da81d8b5680e3baeb49af1

  • C:\Users\Admin\AppData\Roaming\Context\XAWSOHPKKQMHBTRXQ\Caller.exe

    Filesize

    4.2MB

    MD5

    2018644aac84a2de8a767ec1da19993e

    SHA1

    4ec18507a02d88f49a089851e773c082327ffa42

    SHA256

    d2251490ca5bd67e63ea52a65bbff8823f2012f417ad0bd073366c02aa0b3828

    SHA512

    4b171ce616756ace308b61d3d2cc43ced952ce4dc04360ab18499cc959cbf08dc5331610f7bb59c34fcdcb72694b455dc556757cba4cb1ed17b78503bcc26c48

  • memory/2416-33-0x0000000000160000-0x0000000000172000-memory.dmp

    Filesize

    72KB

  • memory/2416-32-0x0000000000970000-0x00000000009C8000-memory.dmp

    Filesize

    352KB

  • memory/2416-31-0x00007FFD1B1F0000-0x00007FFD1B3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/4016-29-0x0000000076320000-0x00000000768D3000-memory.dmp

    Filesize

    5.7MB

  • memory/4016-23-0x00007FFD1B1F0000-0x00007FFD1B3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/4016-30-0x0000000076321000-0x000000007632F000-memory.dmp

    Filesize

    56KB

  • memory/4016-25-0x0000000076320000-0x00000000768D3000-memory.dmp

    Filesize

    5.7MB

  • memory/4016-24-0x0000000076320000-0x00000000768D3000-memory.dmp

    Filesize

    5.7MB

  • memory/4016-21-0x0000000076321000-0x000000007632F000-memory.dmp

    Filesize

    56KB

  • memory/4488-18-0x0000000076320000-0x00000000768D3000-memory.dmp

    Filesize

    5.7MB

  • memory/4488-6-0x00007FFD1B1F0000-0x00007FFD1B3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/4488-12-0x0000000076320000-0x00000000768D3000-memory.dmp

    Filesize

    5.7MB

  • memory/4488-17-0x0000000000A25000-0x0000000000FC1000-memory.dmp

    Filesize

    5.6MB

  • memory/4488-1-0x0000000000A25000-0x0000000000FC1000-memory.dmp

    Filesize

    5.6MB

  • memory/4488-16-0x0000000000A10000-0x00000000019F6000-memory.dmp

    Filesize

    15.9MB

  • memory/4488-5-0x0000000076320000-0x00000000768D3000-memory.dmp

    Filesize

    5.7MB

  • memory/4488-2-0x0000000000A10000-0x00000000019F6000-memory.dmp

    Filesize

    15.9MB

  • memory/4488-0-0x0000000000420000-0x0000000000421000-memory.dmp

    Filesize

    4KB