Analysis

  • max time kernel
    95s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 02:52

General

  • Target

    BootstrapperExecutor.exe

  • Size

    1.1MB

  • MD5

    ee5812a0d3fd5839ad9d8ea190e37101

  • SHA1

    bfec5cd5f72a58995ec3fd1dc909489b94276521

  • SHA256

    acd63befad112fd5dfe1f20a52f101fedadd14b69a89e0b1f2975d4a4452eac5

  • SHA512

    60541b369a748db0573616d7bede82f7909dc7479d8ee87085a3549b3d08b96af09a2d963a6ad78d4ed588c2c333d077e337bbc9b216199d10c0762fafa386ce

  • SSDEEP

    24576:anU6OCXqs1DXccd4c+KrLC/NPnQYoL4aRw/Nc2Wy+RwJayd948kPAA9fmS:ITOApXc3c+dF/nfaRKNc8+CJTvHA9x

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://tradersneez.click/api

https://impolitewearr.biz/api

https://toppyneedus.biz/api

https://lightdeerysua.biz/api

https://suggestyuoz.biz/api

https://hoursuhouy.biz/api

https://mixedrecipew.biz/api

https://affordtempyo.biz/api

https://pleasedcfrown.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperExecutor.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperExecutor.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Re Re.cmd & Re.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2644
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4024
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1704
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4704
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 340917
        3⤵
        • System Location Discovery: System Language Discovery
        PID:860
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Claimed
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4584
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Regarded" Biodiversity
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4796
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 340917\Disposal.com + Violence + Above + Purse + Porcelain + Imaging + Zdnet + Photo + Facts + Ipod + Selling + Johnson 340917\Disposal.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1924
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Single + ..\Certification + ..\Wikipedia + ..\Usgs + ..\Loving + ..\Prophet + ..\Registered D
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3396
      • C:\Users\Admin\AppData\Local\Temp\340917\Disposal.com
        Disposal.com D
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4828
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\340917\D

    Filesize

    496KB

    MD5

    17dd7466297f02a8dfd1b1d3b1446531

    SHA1

    f24b5d9ac103fe1d6ac109c7b374401ec042771a

    SHA256

    e5d5315fc8dc081dbe78f185682759ca7c8493885d892131942f49e5ab411f14

    SHA512

    01f5483f5505776031a332283c70f1e24742048e1b9164b6f63e6b7adef5802a879782c766acc7c145c89620152779edb3b7ef9f47ed83e1503bae313d1e389f

  • C:\Users\Admin\AppData\Local\Temp\340917\Disposal.com

    Filesize

    1KB

    MD5

    32351b77a755a1775a11d05e2be92471

    SHA1

    338ab459ce8b5b2688234fe800b4f039eb7f9509

    SHA256

    ce54d2a919281ec2430da77b48c896e28d47bf55681d2a0f8721c7a4b867f681

    SHA512

    8029ada9d80b03c66f9b9ad6a66ffcd04a1e0a48fc0293849cef0df10b9ecdad085753b306a2e76557475e9ca66e9d9ee9d36630e8704b8920d001bfdd5efacd

  • C:\Users\Admin\AppData\Local\Temp\340917\Disposal.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Temp\Above

    Filesize

    59KB

    MD5

    d88e04f7a23e77ad1be7d45352d1991b

    SHA1

    c187f58ee4ee55f86cc9e9fb884e4648621ac9c3

    SHA256

    ea7713f92c5e61dce396c08c527bc0820033e9344e4f21ecd8f0455da1a9de12

    SHA512

    6ec1db2eb816f5ecb823f3044a1c8e990b8654f0cb132c91508a68f45cf78cda89e64cff8c3c61daf05f53e55c9272b360d9ca170378808cb296611f499d9ad2

  • C:\Users\Admin\AppData\Local\Temp\Biodiversity

    Filesize

    1KB

    MD5

    4fe6f5461c7c40db33d910a12fec2a79

    SHA1

    aa2ee0de4e71001550a3945081882d4a8a1c2d59

    SHA256

    b004161a9eda8d8aa733a38062146c9bceafc32ba621a758718605506010aedf

    SHA512

    e41e3b7cac3c86b17ed5c535709b62ac2889f8326f2478e70ebae80d75566e1516ce2e603461cb550b1ad226894a7f96d946c42ec0c571627cfbc88accb4b557

  • C:\Users\Admin\AppData\Local\Temp\Certification

    Filesize

    91KB

    MD5

    abb21134a4f9211d2f28a8d2ba0b1fe1

    SHA1

    a40a8360efea23fcd9af117f26768cb3d7265ada

    SHA256

    b44e36ed9ff6a88adfdaadbfdb8691bc40606d33f15799810962e2619f80c466

    SHA512

    e48e7efd94916867f8707f3a6b69b3de8373664ad6e31bd25b4ffc639df3fee5bcf9653018a65fc7f74e4342a73721ad2617f12abe9ab4a8ae37ed37b9ad3337

  • C:\Users\Admin\AppData\Local\Temp\Claimed

    Filesize

    476KB

    MD5

    20fc38827d4eb4452035cfcfee2d8c14

    SHA1

    aa4ec6a834a732dabfe1e068b05bf8b5ac9412b5

    SHA256

    f2f03b313f4007bdfac6dd5bb15eddeeeeff5c40553acc31d0906fe08a9c275a

    SHA512

    0ea8b707989dd684944b3f83f94eb5479414323f2177d888bebc2b104238f9f0f353718b714737667bcd9ec00cce52aa248e9f639b0fbd1ac4bd3b9b5e8236a0

  • C:\Users\Admin\AppData\Local\Temp\Facts

    Filesize

    57KB

    MD5

    60ffad7f702c52c0335984fba06dca2d

    SHA1

    11100fc0104616b4c79fe10e71694d5fad766a58

    SHA256

    e7bbd8738ebde9f732b70120304516a70e75ae8448fd7b135941888c435dab28

    SHA512

    632a5660ea545994a17f4643bc74beac19509676a16ce38f31cbc9defd0f4987b64a13fa3b25265c586c6added16c6d7c6a46bcd9238514d916d902e958284fe

  • C:\Users\Admin\AppData\Local\Temp\Imaging

    Filesize

    135KB

    MD5

    561abfe4a979b2713e00849ef7b5750f

    SHA1

    7894820d54b3bd0d0cea927da161e65d408abbb2

    SHA256

    ef840c0c3741162a4055f501a50535dc9f1ab3f1a2adc3ea363aebf3fd0a5834

    SHA512

    bcf4670f8889b25c4e7e9b5e2dc567cd952874abb53ca7b481cd90216254a0a80d5107f3317962440f461b0fbd6bb89d4d3c4d562e6bc6270d8cd0fe51fcc8ee

  • C:\Users\Admin\AppData\Local\Temp\Ipod

    Filesize

    75KB

    MD5

    2eafff2ca929d25609899da5168732ce

    SHA1

    ee838b4a882cb68de828bfdd31013bebbcddca3c

    SHA256

    18757fe406aec7ed2c45e2e380ce3f1bf409fba01ae4a1a195958ff69718e1eb

    SHA512

    6b471e93d739b46e2bb42b24dcc22b71d43b6ddf0e4761c23d451647bd9a39c2be37cb35690e446391c045724459db5a62d29c0c6b42ab8797a02784581ee1b2

  • C:\Users\Admin\AppData\Local\Temp\Johnson

    Filesize

    43KB

    MD5

    e254802b09d9b8bd3847a0df8a078325

    SHA1

    44490d529dcf461b0d6c6418a2059b0cc6557afd

    SHA256

    bb046cff9ed9fc400735abf70c05ef8a1971dd4df24b6fad7995d98881de5ed2

    SHA512

    128736e13f9311cdbf2d2aa2e5b65a8117ab04a40550c232be60b424c608980bfb337730cc29153db18fe06eaca48b6e3085439588568545c27c3848f67f03b9

  • C:\Users\Admin\AppData\Local\Temp\Loving

    Filesize

    74KB

    MD5

    f31b4023aa01fb113405a331278ab9a9

    SHA1

    393714a5765d77cf96b8642410eb2bba0cda5313

    SHA256

    169d4ad56c587292db439bea272a5f0f212a509c0ea3946136cd82d3a4512cc0

    SHA512

    0b28dd7e7f6718993453df48c712e34cc9ec0bff5eda9d152052015861f9cec0acb72b34715bb2d6601683f0fcef3ecf8563032b6cf8dd9b96e5b01992456fca

  • C:\Users\Admin\AppData\Local\Temp\Photo

    Filesize

    65KB

    MD5

    1f34b509444ddafdc5db392355d6030c

    SHA1

    0eb74a71e7f9d032202907e53a5eca616f0854eb

    SHA256

    c3aac528b8ce09f7fa8a8f093bba53a5f931c057fff82703cdb85dd93df2d07b

    SHA512

    21255d420fe6d5dec4bcf880e208df1a39875b3d404c8892f07c228edc6d20431a95ab05c63418f9b2cd15a9eaac74991b758d5869345b86abed69dfd12772a6

  • C:\Users\Admin\AppData\Local\Temp\Porcelain

    Filesize

    55KB

    MD5

    89ea696be802aaf4204fc6c0b76afcc6

    SHA1

    9ede6af57ea48370afc71afaa3adbfef5208eab2

    SHA256

    899437f29213e6649b4c000ee9827e3cac3bd8028c7a2eff28627ab9d88e827a

    SHA512

    748097e7f81658cda377b09559e82d00ffbdbed057188336aedfff156c172604b2d9138309b7d127ecaa706f1373ada29f491ff0a3e6ed9ee87bf44717172edd

  • C:\Users\Admin\AppData\Local\Temp\Prophet

    Filesize

    67KB

    MD5

    cd937d6d4d1cebc84b5150d1a3d4db6d

    SHA1

    7bbef6be5454bf941127e3d0762247e3f918b2f0

    SHA256

    66a998c2b5862f22b098f00ce1ae1e08e9b7298a9ec57aa8db3bf2db253a3a81

    SHA512

    1f939a423cd0e731db0d9f88fe3cbe28c5de067403fe6d9b8f5036fe36f97bbce712e4fa0d68196b712fe4d5d5a73d6ee9624ada0598b81effe7178f7b213d49

  • C:\Users\Admin\AppData\Local\Temp\Purse

    Filesize

    141KB

    MD5

    fcf10aef7e06666b64bd2166f710a8f4

    SHA1

    4168d616038689401e6aec4d7918245ea7e95652

    SHA256

    ac89bff5c9d9af8fe4506382fd7772e1e464f7904a554e75f34963516a848bd3

    SHA512

    295269e5123347ddf10cc2212e569a7cb389d2a33b3fad2dc7327ab8bdb8f956a7ac7f6592489a47889f95b2126bd63e664f28ca72a3c68e52481905e55e796f

  • C:\Users\Admin\AppData\Local\Temp\Re

    Filesize

    27KB

    MD5

    e4b460462746b77bca3afe76fdbf0810

    SHA1

    38e685630a8ef761db8bb8d0fc269dc7ef878dbf

    SHA256

    eb37f2aee73e6060a6eb96c88b08af0b4f273f731b72e99b31e075d4418ce0b5

    SHA512

    f6f8692a053203434cf30e6f8b8d20a1e56c83112775a160d90ea47beaa3b8cccedcb09b51f1b9fb28a4d048d46c59fe6d88d883ef9a0133ce9f7359ff5e6557

  • C:\Users\Admin\AppData\Local\Temp\Registered

    Filesize

    57KB

    MD5

    5ae9352835d7e57259848104d413748e

    SHA1

    565c5865e233cbb15201eb36fcecf0f1b9f1fc51

    SHA256

    ea1ec57ce0147188b91ae6346063e60dabce991f09f968ca86e98437b9fbdd2c

    SHA512

    1aa9781503f7a7f5f3504096e5dcdf00f3ca2ad702e93eec9147aa92a09f1e955ffc41ba4a6dddac73332433b35853d492a6abcf20aa1980ad5f81f2579487c6

  • C:\Users\Admin\AppData\Local\Temp\Selling

    Filesize

    120KB

    MD5

    ef6c0c4a03942b898c1345fc5e2923d1

    SHA1

    802a01cee96e04725ecd527c5f9426fca7edbd35

    SHA256

    fc4c66f7e940be137583a37a40c71ddece824dcb2c945049c56d377f869c8266

    SHA512

    98cd652ec23a7acac03c5097e6e9cc41003eb7146e7eaf21db7ae36de30d1cd6e8cfaceb1978f18e3e446944d776080481eb45e71a1ffd1c52cfe2cb1641ccaa

  • C:\Users\Admin\AppData\Local\Temp\Single

    Filesize

    67KB

    MD5

    5349a477a2081ab09b1f1aca6ca572dc

    SHA1

    57968a903f92ccacc6e7d577e6488d2894e3877c

    SHA256

    b129d35e0906df8b0e81844992d7a663073110a1f60d51e7c1e8995aff9f6cd3

    SHA512

    5806e022a63ea9586d3fc3243793b6a604103b856ff92bd31a396334756df9641dfadacca7b62562f531110715a3b8ec28aaa0c5f0309dec33ad6cb8357bcc1c

  • C:\Users\Admin\AppData\Local\Temp\Usgs

    Filesize

    70KB

    MD5

    9152d897abfc11e7f47f4dcffa4e1dcb

    SHA1

    bac18a4e2819d4ecf18dd70d5e36638a58387ed0

    SHA256

    a5ef2e4a4553670780a5d4fbac1f4ff7ad2232b5eefb343f6548a1b68912138a

    SHA512

    5f23307e7c29ec2d9cfd0063b9dfa6552433e90575958a860c76f11302a5397e37723f65d906d7f3c92ef9843587fee4b4f98a96adf5d6dabd4dfc80afc351ba

  • C:\Users\Admin\AppData\Local\Temp\Violence

    Filesize

    85KB

    MD5

    98624849254fb1f0653da5db882e1560

    SHA1

    5c7967add2247827f8d8fcc4f7311a66a4a36204

    SHA256

    0656568395a1b68f778098b6d3519bdfd86dd9f5a39da10a5850b2b17545f139

    SHA512

    27dc9d10e8c3113f62028435ddc51b9402a8d507ea1f43a88a300374a722ad20fba8c7877bc483a0f55deb0cee25e3bb64d54c32cc032e4d1384a1626d8e2fe1

  • C:\Users\Admin\AppData\Local\Temp\Wikipedia

    Filesize

    70KB

    MD5

    070190137c2a7ee0e964e261ebd9e25e

    SHA1

    3e5230f125ada287e1ccd9e52733539762cdac7e

    SHA256

    5cc23023cf6ea445764a4b39ffc0a4ef3ba9099254eee86b1ad51db63bcd5233

    SHA512

    547daf63266a12833e5e370eb606814a01b89c266fa3fce9ab47c686a0929e91d9b515ab3d7cf41954ccfceffbeac22e9756f298aad4710d01c0ab747bab9e1e

  • C:\Users\Admin\AppData\Local\Temp\Zdnet

    Filesize

    88KB

    MD5

    ad758f1e2bc2c34ec6c8a23df9236746

    SHA1

    48807f2ec69dc2cd96f78a7809d99f63853acb81

    SHA256

    c806b7ae24975aa2b7c4635d4c75781a97092e820946c0405630d7441985f3c2

    SHA512

    b17ba342403e16ecfde952dc5f482ad31c011375d3791046fc056170001073c169101e2cd37939c95cdbd19ee785b9ae53b572daec7a4628f013136c163f73dc

  • memory/4828-681-0x0000000000270000-0x00000000002CB000-memory.dmp

    Filesize

    364KB

  • memory/4828-680-0x0000000000270000-0x00000000002CB000-memory.dmp

    Filesize

    364KB

  • memory/4828-684-0x0000000000270000-0x00000000002CB000-memory.dmp

    Filesize

    364KB

  • memory/4828-683-0x0000000000270000-0x00000000002CB000-memory.dmp

    Filesize

    364KB

  • memory/4828-682-0x0000000000270000-0x00000000002CB000-memory.dmp

    Filesize

    364KB