Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2025, 03:44

General

  • Target

    921d75c8cbcf2c934df28a2f1e615fb468e663bcc94f8012d220a7f7cf9120d0.exe

  • Size

    1.1MB

  • MD5

    3e8e6967fd4794ed4d29e34bdaaf939c

  • SHA1

    36687e95877a56f1b8db8ed3771d6c208ec8422a

  • SHA256

    921d75c8cbcf2c934df28a2f1e615fb468e663bcc94f8012d220a7f7cf9120d0

  • SHA512

    af2232d188fd7a8617ba22bb83cf1cf6288243d9deeda4470c4d7d6b75592c0917684266d251fb7d20bf19f9bb2c31bd0e9880fa6b2117465493f5be09234267

  • SSDEEP

    24576:4KUXU/58hwuSo0dGjhpcKwE9fY5bBIRZ84/gwW9TH+OLDR7C:TUE6hmo0dGgb5bMZ84/ZODR7C

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://toppyneedus.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\921d75c8cbcf2c934df28a2f1e615fb468e663bcc94f8012d220a7f7cf9120d0.exe
    "C:\Users\Admin\AppData\Local\Temp\921d75c8cbcf2c934df28a2f1e615fb468e663bcc94f8012d220a7f7cf9120d0.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Tablets Tablets.cmd & Tablets.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2296
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1688
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1248
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1820
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 40022
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1164
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Warrant
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1428
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "RAYS" Wales
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2852
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 40022\Chapel.com + Double + Pirates + Herbal + Shoppercom + Ing + Preparing + Messages + Character + Dare + Knight 40022\Chapel.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2320
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Fleece + ..\Biographies + ..\Grew + ..\Allen + ..\Adaptive + ..\Wr + ..\Samples B
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2028
      • C:\Users\Admin\AppData\Local\Temp\40022\Chapel.com
        Chapel.com B
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1328
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\40022\B

    Filesize

    489KB

    MD5

    186e4c262bd05bed73b1a18a20c5c3a5

    SHA1

    538d2067c7b4ed1889fa6ca11d9c3f84c94735b5

    SHA256

    239bf24af782db4b812726dc5d03013ba5629d3e602d69bafeef48138c427325

    SHA512

    c25111b8abd90448882b4c18295be30094b0173e1e65cb443c3c9a9ccc72103f8cd15318f3da0cd83fd5df421b8a72cb9f69aaad6bdb98ddc6576321f9006c5c

  • C:\Users\Admin\AppData\Local\Temp\40022\Chapel.com

    Filesize

    116KB

    MD5

    e958f00740a92b4ffe9f4e7579bafeac

    SHA1

    43b88740d20ea83e923d779bf519aefef9ec77d6

    SHA256

    df4e8b8b90e47ac19a2486a8246860ecea08319d2d31df901f19de1f215bdb71

    SHA512

    f47cea4bb0f7abea8998fdbc35d9d985b0319179ec9ca3f96990424d9b2ed704b1a760455cdcc1ac88ca9ced8b33cc50efcfca4135cba2ed8eff824ce2c6a712

  • C:\Users\Admin\AppData\Local\Temp\Adaptive

    Filesize

    71KB

    MD5

    43304e2bf651fc6b4d4c08dd596ec3a8

    SHA1

    d8cb201d4723fac49ef64f9483f42585021d3ad2

    SHA256

    8de1f7e2599a53151fd73854020886fc170c3253b9c7086116ec06e0ae3cd7fa

    SHA512

    a3e1945c99a2c69a4e2fd66417067a40325e10be486702c03267017d186a24821b9e3f0b54d3b06b39bae6b03e0e77c9464036e4d4dcae04b781f99cce41fe1f

  • C:\Users\Admin\AppData\Local\Temp\Allen

    Filesize

    54KB

    MD5

    cb2d7f2b2cb42cf703823ad5094f0249

    SHA1

    b0ec2a4e26788c874736c511ef816403a7f1d65c

    SHA256

    aafdaee3b609669cca866620035d15d4436fbad04f10a69116cdfa00fc66e2b6

    SHA512

    cb6b82819123c9858a21b62056217790d26e1d27642b8b3b0a8cc6cd65107e28214fdda5eec759eeba52e2f3cab1a2c170b3ecc01e99e384ef9546679f74d93f

  • C:\Users\Admin\AppData\Local\Temp\Biographies

    Filesize

    92KB

    MD5

    cfb376113837f1eef5bf7d100b5c150a

    SHA1

    60489b33638771700b35417e20dd60c81bcd9564

    SHA256

    b91cfa84a2d15985db106de4517f04f08452b5ea9e04be8e3f6babd46b324250

    SHA512

    a24d9b7ce2bab937f754eac9ac9b0f6706ea09bbb0204ecfcc647b5a71a027a36e2448b04815b2d720f6f1c3dd9767ef616173dd010b35a8a763537c0b12932d

  • C:\Users\Admin\AppData\Local\Temp\Cab9F2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Character

    Filesize

    84KB

    MD5

    45867c0ad4cb24934a7692853ad9836e

    SHA1

    0a5fbd6875bac3fed917477906d193137efe8306

    SHA256

    0319704e4aff33195e5c53b30fa37c74090f42b5cb6529901649f3562d79b404

    SHA512

    7313ba4aae3af392b3ba715dddb59a103cfe9485f878ecdf6c18c701e52bbe280ea12b86df5eb472d5da7551a0be55868d985a23574a6fca53cc7aafc9be7d79

  • C:\Users\Admin\AppData\Local\Temp\Dare

    Filesize

    139KB

    MD5

    2725cf453f8cc51359832b5017c309ab

    SHA1

    8359d6e8555778148dfd038f5133ab5ce3c13b0f

    SHA256

    243b130e24f26dae33c518d8d0fc2bcab0e7da2316e56b1ff566036a27ca137c

    SHA512

    3a57a6094b3bef8f9a82a29680de4d173002ed65c78c5c5d391cae0188e8187d4f648ca98c0e076a88ba21b8f499c97cae1627540182b75f824697ac500eb618

  • C:\Users\Admin\AppData\Local\Temp\Double

    Filesize

    116KB

    MD5

    463014b392d5ce12a1a7c54c91809cc8

    SHA1

    0fa6ab57d3de9e0e4742cbce60ee544de56cde0a

    SHA256

    2e81475f02ea37b711a19055847149b93c3bf58c288290f74a71abe52952ebf2

    SHA512

    32c59c053f16a5698fb6b569a89c074887deb815e0dd3bb31a514c4ae65e7ff0e9ed0ea86c19c528f6f5561c8108090113cebd4de8a9f3bf8c2a52bec3c6b946

  • C:\Users\Admin\AppData\Local\Temp\Fleece

    Filesize

    83KB

    MD5

    c32242a35d1fa68238a93a1d8061a596

    SHA1

    aa29bac5963171c241909c6e46f86b082d5880ea

    SHA256

    cf826a278ecadbbbc2d4caa0f16ccbce08a836c411ad0049e2a8750f19efaf1e

    SHA512

    cd48b8dfd5555452596305201190223d7921a6a1ebf34b722c31f4c057a79eddeedf2458d4ffd2431a06385585ca2d5f5d889e23bf80d5b9ced08429732eb78a

  • C:\Users\Admin\AppData\Local\Temp\Grew

    Filesize

    96KB

    MD5

    4fdbb6ad4882baacff4756473e2917bd

    SHA1

    bf240de2cb75212bdba466d5d9b84d383c91d2ce

    SHA256

    50e727843dbb81b79f0a1997aee66c6b50d4d2ea566532027dd21808e3756bc5

    SHA512

    06935059e66a06ace5fc216be316befaac18d696c13d1b87ad60dee2f902311f135f9e6025ec09dbe2035d850af8a28cfccce51a4d6ebb990cb9c9f41e9c161a

  • C:\Users\Admin\AppData\Local\Temp\Herbal

    Filesize

    84KB

    MD5

    30b67b9074770d9d0e99ebbecc65ba12

    SHA1

    f77bdd42fec694bfdc5f05bd68500763f127b225

    SHA256

    117b92dff1bd6752250349e70d39f166910427dbe9d5f5fdee401bdba1bee94e

    SHA512

    dbedcf11cf98da20624a6aa07f9db8cd29c8b61ce854f88827339d7c5b28fd14e7697b28aff8845e96e1b3445010f038fdbb29c3e6395e1622ce14c86d75bd79

  • C:\Users\Admin\AppData\Local\Temp\Ing

    Filesize

    117KB

    MD5

    10a41fc2ac27270969f853aa1b4649f6

    SHA1

    739221d156dbd8ff9e2071b724243f0733184cdb

    SHA256

    494a928d3bce1f1d67afcc47218c27df66f8754ba786b4e3ed856066f0592d38

    SHA512

    62d0087e9d0af9fa7826c5e7268030428737dcd26d0285561ac5c7777c81928a1c51c0534979329fe850d6070881e3cbd826f76ffe8841aef8a00b50a073ed68

  • C:\Users\Admin\AppData\Local\Temp\Knight

    Filesize

    21KB

    MD5

    f23849fb71e6b80fc6573bb34179f612

    SHA1

    c198618b47f5fb024a8d8bba5362670994c8e9e3

    SHA256

    934d6f2398c7543d476ba9e7f2475b6fac4026915d113f6c09b5f11794857f45

    SHA512

    9ccf6aa0a20ccc31b005174bad7105232ecac3f99e58019d324066b0bf3d98e6c2ead0cf522e52c2c36335a177516bd6799007e935f967fb6aa65c6aea90f244

  • C:\Users\Admin\AppData\Local\Temp\Messages

    Filesize

    68KB

    MD5

    c532f5343c9922885bed411f3bfffa64

    SHA1

    2c8c5a77e854cad889a704f51b1fb5deac2e2b62

    SHA256

    da5e56bff21a616e46f1986a6b635485707e166206c100b1d468e7a5227917a5

    SHA512

    5631bfd802703d407c6bbb42b22a30526d9dbb564b7a93e6a6e4423353181efa3c95fb97b4719909a20c264f6721b2797d8f029d7927476832bad81ea7d8d253

  • C:\Users\Admin\AppData\Local\Temp\Pirates

    Filesize

    125KB

    MD5

    5bc1cfb78da63f05d160241eb57124de

    SHA1

    8cbdd6470986462086456420eb017be47d12228f

    SHA256

    79f9a6798c82f77cd86165400b3bb4f95706764db6130395e5ddc636e1976536

    SHA512

    a15065714e88f36aecc0340f00b6e28861d90d9920531f1ce12c0d54f05527c219f14e5f3dd9c5d80412fcafb01751f828e2d3f4e99ef154309f803a85277abc

  • C:\Users\Admin\AppData\Local\Temp\Preparing

    Filesize

    107KB

    MD5

    bd9cc5fab7ea9198cdf86903b17774fc

    SHA1

    2f08e6025f29b6ffd26961bfb15d9017280c9ca1

    SHA256

    30bd7d8782cffba502a24048afc94a2b40720ac74b9dc2ed48d1ca531a392297

    SHA512

    3929ad00fea55653eb2ed6155fa87ed9d0c958ba557b3b4d5a2326434504f2d43a11f855c836286d8860f086bba4347ef528f04450fcef04dc74d22bea675fdb

  • C:\Users\Admin\AppData\Local\Temp\Samples

    Filesize

    39KB

    MD5

    ab4078343b697bd58ef9ebb13255fece

    SHA1

    7d3a10804e32814eb9ecb0dda4bc45b29c24ef7c

    SHA256

    fcc391469d1e25c581d699431d7ef9bc894e749f691bfae3c4e35c01546ed4b2

    SHA512

    4d64978f79c76d47b7187ca2eba1a1ec3bef488a3db6a04fb2b1670066d7cb3a80f577ab469651440f13fec759621dd7793e432246ebd67efb21d5894adb4c3b

  • C:\Users\Admin\AppData\Local\Temp\Shoppercom

    Filesize

    63KB

    MD5

    2bf5dcf13dd0ec13b061c8c72bcb455a

    SHA1

    0c63eecb901450430fc660d8228fa565d37803c6

    SHA256

    82dd8e2b96918c33e6da0e1015ab88d0cbecfefbbf3cef3417d53f77c04775b6

    SHA512

    5ddd7e04f703dc9c009f666c88e4e667fb0c57e640ce204d91c7507f8488a1e3bd45d762fd3c0cab02539c32a6a6a40b90951377b884a358365e7166da932a2d

  • C:\Users\Admin\AppData\Local\Temp\Tablets

    Filesize

    9KB

    MD5

    f44edfabf2f81f5ce5aefd194acdb498

    SHA1

    0c03343c487b2c836f9c099e443626b4028ea8c4

    SHA256

    eb1ef4721496a6bb97be758f81001a63cf3ae2f480a5fc7e24a1b80d2a01b878

    SHA512

    fe83d40305e46c848213cd257547367077afbc6a2f532a6b58b808133fdc8917f31ac5629b9a2c6adcc3f1671e73b7cb248904a5c95ab8e7845057dfb9625891

  • C:\Users\Admin\AppData\Local\Temp\TarA14.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Wales

    Filesize

    384B

    MD5

    64ec3f7282ff9687fa67cc957b99aa80

    SHA1

    4cf976e5472a35466198fd618f91d0bec3a44644

    SHA256

    f0f30c23b641948b923e76de92c59df1250e2db71de2b940c07f71f6ecac72b1

    SHA512

    85dcb954015ab88cc9e6993e0e4bd0080fe601d927b3dc0982b62539df8627c1df6884f58ff10b895c7873455ded7c82d19be61b852382df738b2b4186f878e8

  • C:\Users\Admin\AppData\Local\Temp\Warrant

    Filesize

    478KB

    MD5

    9beb1989b5fd1868c62ce28c370b148d

    SHA1

    9fcfac2c1e0faa65e9bb9c49b88a8ea8aa2ff260

    SHA256

    59eed3fa1e29686d0ac3ce1ed502b013d77b67772d666b1d75cd669f7ef00e21

    SHA512

    747a177d131bb0d606975dde8702bfe7297f0174c0836a156083273e7cdaccd6d5583350d9223574ffa33b22cfe1e02bbb3c0d255e80d459e4c7f4560d80ffc7

  • C:\Users\Admin\AppData\Local\Temp\Wr

    Filesize

    54KB

    MD5

    2a571fb5bb8ea9fc4f2e46e5b26f701a

    SHA1

    bb3b08a45a156ca6afa1f6daeff6dc1ef472e95b

    SHA256

    1da5680e212b229c64db1a9ad0c7dbc6cb6ead77c4bef4382ef3793be8eb1158

    SHA512

    30e11cd017302c9a097a8b077f560d9a2dec7c5b0a501003fd17cc51e7bc7ca557d21cd8b11ac57f57df1df9620d4ce0d83875fdbd2f2f22a0b81e8c679ed4ee

  • \Users\Admin\AppData\Local\Temp\40022\Chapel.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1328-285-0x0000000003660000-0x00000000036BD000-memory.dmp

    Filesize

    372KB

  • memory/1328-288-0x0000000003660000-0x00000000036BD000-memory.dmp

    Filesize

    372KB

  • memory/1328-287-0x0000000003660000-0x00000000036BD000-memory.dmp

    Filesize

    372KB

  • memory/1328-286-0x0000000003660000-0x00000000036BD000-memory.dmp

    Filesize

    372KB

  • memory/1328-284-0x0000000003660000-0x00000000036BD000-memory.dmp

    Filesize

    372KB