Resubmissions

26/01/2025, 03:18

250126-dtz7la1qap 10

Analysis

  • max time kernel
    51s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2025, 03:18

General

  • Target

    Bootstrapper.exe

  • Size

    250.0MB

  • MD5

    7b61ea5d614308dabc45291947493a49

  • SHA1

    44099e8be0221f7637c398ee4da64a10f032bf9f

  • SHA256

    b3f2a5bde68ad2dcaea3c50ef3ea31162ce8a4b0ee31415f88730d9283dfba19

  • SHA512

    6fc1b648b3c0b7adf7517281871dcf164c829bd5428604b2863e6347304a4784335490edad054cd3c1f128fb341096b161799139957cfe09e9091916d2cbf055

  • SSDEEP

    24576:p+f23ewMKv+wONba7GdfD5igopXGUQ0+m8picMCgE5:0mewMKmwuua/iXWjdicMS

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://sheayingero.shop/api

https://toppyneedus.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Peak Peak.cmd & Peak.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1328
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2324
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:976
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1384
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 177979
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1316
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Flyer
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2624
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "tone" Intensity
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1032
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 177979\Flows.com + Baby + Monday + Franklin + Keyword + Native + Box + Indeed + On + Mutual 177979\Flows.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3004
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Scheduled + ..\Metadata + ..\Columns + ..\Challenges + ..\Age + ..\Burner + ..\Ideas + ..\Three I
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1688
      • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com
        Flows.com I
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2164
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2692
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1660
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Documents\TestPing.dotx"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com

      Filesize

      1KB

      MD5

      8f9d821f8d7a79581a2ab3a0986a78f1

      SHA1

      b7bf35a298f8c440c28957e54f636dd91e35e31c

      SHA256

      a22de98030a228592c7d75a2c6fae0a637d7b4e8a2c52da61fef50f88478a86c

      SHA512

      0989650bd42270d5dc15bc77f8ee01e37b8dcbb3043a623cc5c1e8fff9bba8970b149cbc57281f4facb41509455f5af684a03cf96fadaedcb50d1e0f856ab9d6

    • C:\Users\Admin\AppData\Local\Temp\177979\I

      Filesize

      477KB

      MD5

      8ce37257e647eafc2b435f2b56f2b33e

      SHA1

      beb990946ba7aa30d7f3f0c5242c5ff74ad2290d

      SHA256

      7385853f9d1e0473cffea742bdc89c69eabae19750402f7644c5e9c7274685db

      SHA512

      9e43b761faee231f440d405a429cdd4c45e155602988929ace1f34946951d18fd08a6b833e866642001a58b42971cee678667e5490adfb80f004a025f377e7d6

    • C:\Users\Admin\AppData\Local\Temp\Age

      Filesize

      60KB

      MD5

      84692b422690f4852cb88836dbb1e0b0

      SHA1

      931fd3f161113cb84407455b7786dd63bba3c15a

      SHA256

      cc2f5e9bac8af1aaf86d2c004f1b2234261b6722c1b821c2153d1835372ee875

      SHA512

      74f5610074976dc96c6e387e9719f789b4a2c4ec0cb1cafd20452df7b268a9468672a38169c447d534261ab7b085c135828bc0c84dc5831d5c82e3cd36161fa7

    • C:\Users\Admin\AppData\Local\Temp\Baby

      Filesize

      133KB

      MD5

      a86c655555e2e198272d833d78eb743b

      SHA1

      0f6bb609d65d8ae521f15f2306162e69469c57c8

      SHA256

      d6108619ca2f1670ef01ec58fd62d98c84877c7d6cec6075f27e7b926d71de12

      SHA512

      26b4319d1fd657f3e66395fd8db2b229358d487c685a4d6ac42d61c7604eb9920b2da6c16fcfd6e81ed512edc715630122fd8b9a6066ee3e96c0155ea1273eb5

    • C:\Users\Admin\AppData\Local\Temp\Box

      Filesize

      71KB

      MD5

      1b2da465247a01a3b76472249a3d0deb

      SHA1

      616f32ade9272c6d240506b8a74bdcccea9304ae

      SHA256

      94d5c530034c5ec9506c5e3b52def91b4e79b9222d7da2b712d00fe6f002d35b

      SHA512

      dfe9da0f3b449c24c751d4c0cda6a0377d1070461c4f25b1900057a02108c5768e350f0c0e217716cec77001a4f629e14f64d55894ff19f73f36c3e24abbeef4

    • C:\Users\Admin\AppData\Local\Temp\Burner

      Filesize

      64KB

      MD5

      878f18ed4b302e6c94d0a190d145f697

      SHA1

      c67320a66d6148485dec9075081db6957ef50e3c

      SHA256

      96e0e15abacaa99c9120b398a4d0c9eecfb08d789666940b74759ce913979713

      SHA512

      8545bcf1a979bae7c1de2aa34a5198ec772161d021e3fb302de4bb631a6796dddc9093f91b7ba14e4d41327c463bb61d2ff0b1fa8bb48c7cdc9808d5cc2f652f

    • C:\Users\Admin\AppData\Local\Temp\Cab3516.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Challenges

      Filesize

      94KB

      MD5

      0fd905bd29e18e664e3d3d9a6bb06ae6

      SHA1

      f532f1ba93228a60a483b40e4cd9c41e08877a27

      SHA256

      958643e7eba918e3867e1813480038d19716f39740d882755b7030ad8ac3bffc

      SHA512

      22416b891d9cb11adb5a5483e7eda868df6e5439ccfc635c077206c030d1814070c52718dedd3307983982d92a57b9644afd66f8e4936905da04ad4a3837f7a2

    • C:\Users\Admin\AppData\Local\Temp\Columns

      Filesize

      56KB

      MD5

      1c070e2cfeee36acf2fc7eb8c940ea66

      SHA1

      bb0e3d8db79e93bc732227bf3b5328c34e2dc254

      SHA256

      9a34487568789c5baff8a4fc46f0759d8d7cc06189ccbff928c3f6f2a0cb3cbd

      SHA512

      d58a8eaa563a6f092d062f5d31b16195c48b9ac5a657c8e2dbcf658c000b24bbc092d2526a4976f820318a0586037b9e707b1b2f06b8c972e34b7f767c5024c7

    • C:\Users\Admin\AppData\Local\Temp\Flyer

      Filesize

      476KB

      MD5

      0338ef5a811b1886bc1c34f368cb2ffa

      SHA1

      d4c5d8a923c3271e1fd283ec1d8163b67db4dbbf

      SHA256

      3ddd2fe9b650e01e2f8b8940c47d5fc5039962a2f5315646c0baad6a2fdb0fa2

      SHA512

      8b0596bc09da58e88a959d3d73128e1db6c3095b283ee2e96be7048d055988c27b45f4a256ccaa22d489082262722900b8d01afd511efb8187153265266aced8

    • C:\Users\Admin\AppData\Local\Temp\Franklin

      Filesize

      93KB

      MD5

      56e4414823fd2b7142284ed6d5a363b7

      SHA1

      64ee8eff5dc6de329ca71d2bdc8280a55dde95ba

      SHA256

      c5a5cfbf1ad6b80af7b467a232a5c016f8e077e5e33a84c306bea7fd3c5b319b

      SHA512

      6e8f863ac5473e528a6eef96c07a56bdf2cd5572f2df68cf6745d5819c367160edcb098a378ef4d7de4814aa4a09705d1d11be2aa949c44b7d56f201952881bd

    • C:\Users\Admin\AppData\Local\Temp\Ideas

      Filesize

      60KB

      MD5

      7b55e663410315b46b7c6cf9694f2608

      SHA1

      052f23cbbb5534826753018adc62f29cc7ae94d9

      SHA256

      37e34e0e46968b68e412ea504b05c5156252dae0b70e0687ba90271f04bb45d1

      SHA512

      dc4c6c0b7b3d633aa7d07bac7ee093867c043086bab2d0a450a726f9eef7a75f9b6406b567a1dcfbbc6d4fe87b89dfbb772f41e4aa2a90e0464edde3ea6a1479

    • C:\Users\Admin\AppData\Local\Temp\Indeed

      Filesize

      147KB

      MD5

      09c30eb57d7b8d5b6d2bed9172d72dba

      SHA1

      fc927ce49b240a9074d7cebc24ca184edbd8a1bf

      SHA256

      b321aaeea6b3b59d803228074d3d92a1f3c708c6b7ea46147c95511215cc105b

      SHA512

      fc34121fbbef228a8b250142cc10d47de6969f13d22d539c5e4411fe0af2c1117636413092e8fd756354b634a42f47bd6e584700ca79f8ab3113ad64f6ad2fd4

    • C:\Users\Admin\AppData\Local\Temp\Intensity

      Filesize

      1KB

      MD5

      f61e65c8b5e558627396ed8261aee6a4

      SHA1

      9a35551af1d6bf2ffa97d15ec9c5b39d0f6d505a

      SHA256

      86d914001ade248c24ebdc8e38e39565c4f5bc2bd05deb357cae22d805707d72

      SHA512

      65be47472dca6c4eb8e099d54dedb8169486449832ff29ed563d632954d48789731b16fb442717efed0b5742e7a672c11e032fd4ccfde6b6e0cd77a32e8c9b92

    • C:\Users\Admin\AppData\Local\Temp\Keyword

      Filesize

      124KB

      MD5

      6349c17c75b1138329f07491744a9ed4

      SHA1

      840c353b3f6a3dfc0b75bb389e2d9903c98890d2

      SHA256

      15c91f0da6a7118a864f230d59149f8d56bf3d50404fd5b5c2b610a5dab0d293

      SHA512

      bea4e290e2b7a246e42facd5a987894b267881f26154d67f56b179168b1da9c9338d41f9808f63e1d0de8995c50e321e44d228d1cef761ea8faf9f159904b787

    • C:\Users\Admin\AppData\Local\Temp\Metadata

      Filesize

      68KB

      MD5

      2a0bf741f448dd30696be8f465b5b833

      SHA1

      b4a2c57793378236bf3c50c1fb45fcc1920fbbca

      SHA256

      3a3a09f732bb2b46fd1ef87e67088be5614dffe9fa661afa8acf2d7764ab7496

      SHA512

      269a5e255b674017086e2bc74ef8c6f7f14176e923283cbf8113ebcd5d585b485f5b43f9aec6ae9ffcdb6e8d5248c8bb70e65b3647ff7f10409938313ec96c5e

    • C:\Users\Admin\AppData\Local\Temp\Monday

      Filesize

      84KB

      MD5

      b8eac858c394e989430167327a8ae7cf

      SHA1

      c7226e8012f0888b7bec48d0afade50534db1fdc

      SHA256

      45dd80aa6a648289f7f13b413884b6e288018c8178bce3df58c53b49e51f68fc

      SHA512

      5f6005be3db377c0050189d8ddab64f1e43e61f0471a6239d03af705f51cdb3d64ba3011fdb8c9c7d569cf4321f0abb13a0fcf1f088397fae390d5bcc4aaf802

    • C:\Users\Admin\AppData\Local\Temp\Mutual

      Filesize

      67KB

      MD5

      07d393f56efd3b9326606b437b71f1d4

      SHA1

      bd63b40e51e2e6c68a266e9f06f20b94e29c882c

      SHA256

      f0ef7a9e9dce3aebcf8e05805ba9c1c912c4faae9e01b9ca3efd2ec83f528414

      SHA512

      ad6471df9322535eb862d86cbd342ddf3e744932889972d310412b06c0a66af807f708c115232f29278c074ec9611896e91876a99ba468494bd4304a1378f559

    • C:\Users\Admin\AppData\Local\Temp\Native

      Filesize

      90KB

      MD5

      b09fe66fe9ba0c96d5f09e3cceaf61a8

      SHA1

      04e173e7bc1d3c632d206b2f38bdd2bac4b40a21

      SHA256

      b5f56cd6ac094dec19e7b1ff1ed162dc07d4ca3af7579adca5ac9c43a44640dd

      SHA512

      746a22266eb2c8d8d89de5dd3c605ead29d2bf0b172bdedcd6d298126dcc02522707e488c3400cd2edb7cd0265a7e12212b16ff336f148a39a252055c653a959

    • C:\Users\Admin\AppData\Local\Temp\On

      Filesize

      114KB

      MD5

      6c1c4f39f2bb55057641898e3d376930

      SHA1

      b43b16c85687517d3dd83f82b6b421304f7e628d

      SHA256

      48e5d116dc1494dbd8905eec10832aa7ce19f4f812d91514ab6fce5ce6f57cf7

      SHA512

      ff4ee5c654f50bea1fb92ace656c952ef573759f08ce072468d5029e6c38d77609a200de54f49c68c9fecf6ed515dd2864ba3acb1a5ce523d6a3efae9745a3f0

    • C:\Users\Admin\AppData\Local\Temp\Peak

      Filesize

      30KB

      MD5

      20718b8b13d6d0de153980d6759d39e5

      SHA1

      d3ac2a4ea8dcbe0f74f4ac148c4567aeb6f707ad

      SHA256

      abaa9a49fce5f6ee29eb407c9aa85961ab8f256a322e3309cf7c874ef7a56e9b

      SHA512

      2864b793a479410ea6ba152490ff313e40a6357444245fb4935777d9ebf854918bc5ddbf8d4b3d348a94b5931501664cc1d41b5617b10e62bdd24efba60fd0fc

    • C:\Users\Admin\AppData\Local\Temp\Scheduled

      Filesize

      56KB

      MD5

      99b09fb9fba65c428078b8ccd89f90ea

      SHA1

      c1ec375fa1c9ac8323fa156596ff7694b4b18dc4

      SHA256

      86bc96aaf2de8304b80d0ee08ea403686c2dca2c5c623eb7692ab85b41217910

      SHA512

      8fe7a7ed45a52ce4b6b0b0a325349d14598953f056f331d4aba128c11dbcf06f6b1f1ee58e92dcc7f7569e60fc97561118841dba8a77b0c32e2ee95dde964e24

    • C:\Users\Admin\AppData\Local\Temp\Tar3539.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\Three

      Filesize

      19KB

      MD5

      2e94c6d5accc6a1afec513fc9bffce73

      SHA1

      f58f072d322645b8160adf57e4de7383dd5668c6

      SHA256

      6f8378f9fbde1d7f59f5ff455f8aab61eea7fa7c591f05bf88f761be2cbaeb65

      SHA512

      c62b03e9320333c174b04988d33af71dfbd9a37aaa8518847a2bf14a29a1c761481c6869d59b7f089a775cc06f023fc93c5924da47f2ca25fb696e4fccfd4ffe

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      2b27a249ecdf2f5158f6f6dfcc5d8954

      SHA1

      502d3047cc352a01f8300c384f2a04cf613611b0

      SHA256

      4969c6c9cb77e9947666fb9b3e7a8a745f2adedc034397b028ce2eb4e4dd1858

      SHA512

      4c0b4f5e9242261214d64ca9cc69c102b66cd09911b079aae0b858119d2aafa1a54b61f0e2461d9db049bddb16b9d108e9908a1f761b5665c9d5c76c10ef7c3a

    • \Users\Admin\AppData\Local\Temp\177979\Flows.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • memory/2164-716-0x00000000035D0000-0x000000000362B000-memory.dmp

      Filesize

      364KB

    • memory/2164-715-0x00000000035D0000-0x000000000362B000-memory.dmp

      Filesize

      364KB

    • memory/2164-718-0x00000000035D0000-0x000000000362B000-memory.dmp

      Filesize

      364KB

    • memory/2164-719-0x00000000035D0000-0x000000000362B000-memory.dmp

      Filesize

      364KB

    • memory/2164-717-0x00000000035D0000-0x000000000362B000-memory.dmp

      Filesize

      364KB

    • memory/2904-754-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2904-771-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB