Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2025, 03:46

General

  • Target

    99208822ac147eb08fbc38394ed52fcb3802f0ae09576e97aca85e6d75e5abbe.exe

  • Size

    1.1MB

  • MD5

    a0bfa12b9b22a817f006946674a5641b

  • SHA1

    967610a98a014f7fbb05f16bdff677837bb6073a

  • SHA256

    99208822ac147eb08fbc38394ed52fcb3802f0ae09576e97aca85e6d75e5abbe

  • SHA512

    a833beb86a70bf7d126fb2f3c9b0d7cc063fd10201ab3c3439f79a5e69028b5760f8d4f354e70cf031721b63147729cf49f75c27c9e62cf28be74649d16fee18

  • SSDEEP

    24576:Wmedwa3ua+diL1yGtg4lWbl/KmVZeNSvgAeOccIFKazSy0jnV3xBzRb7Tb7j:pewa+ay0cxjeN27HccIwa2djV3xBh

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://toppyneedus.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99208822ac147eb08fbc38394ed52fcb3802f0ae09576e97aca85e6d75e5abbe.exe
    "C:\Users\Admin\AppData\Local\Temp\99208822ac147eb08fbc38394ed52fcb3802f0ae09576e97aca85e6d75e5abbe.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Noon Noon.cmd & Noon.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1968
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2424
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2292
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 398587
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1012
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Prohibited
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1748
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "COMPUTING" Florist
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2952
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 398587\Albania.com + Theory + Decision + D + Minnesota + Organize + Monday + Reaction + Pets + Prince 398587\Albania.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2068
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Hair + ..\Cloudy + ..\Lcd + ..\Ni + ..\Rick + ..\Mr + ..\Lanka g
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3068
      • C:\Users\Admin\AppData\Local\Temp\398587\Albania.com
        Albania.com g
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3036
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\398587\Albania.com

    Filesize

    665B

    MD5

    c8b5e39a66c725a0799cc4543f56cedf

    SHA1

    4cd4b78857a67779d7c5a66023a845bdc951459f

    SHA256

    2722a2ba0d58696082d176572116ba94ed9f41feffbf027002f775ca7833b541

    SHA512

    a0253c69576dd12edb392e6af5e5c84f2c058d1771f49c46cbb101d5fd39e9ab67ebd22e68aaa647d7c98d6c4a201136134b567e10ee66d97d2c897da9f04ac8

  • C:\Users\Admin\AppData\Local\Temp\398587\g

    Filesize

    496KB

    MD5

    d3f2927332e74e6d25d3d4082754fae0

    SHA1

    3806e395c8603bd3d9964c4877059843cd481850

    SHA256

    6149aa9987ab8c8348bbc525160b51e66797296d008476c714d285c23f09fd4e

    SHA512

    76c581330cbddc83fcd4f1ef1b2766dbf8b92002cd12150ce9f8fa5d78eca4507dba871e15a8d5a17848d1b8172e0b122a0e51609b9d39ea8ce035a93409dc3a

  • C:\Users\Admin\AppData\Local\Temp\Cab801A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Cloudy

    Filesize

    52KB

    MD5

    42d2ee5293fc3fdbd225e39a2f0ba644

    SHA1

    b38f367bf43eca47bbe8ceccd548c1584762605c

    SHA256

    27fc919ab880717b82423d4473f4c1582fa5bea040525985aafb2d0be260fa7f

    SHA512

    9c10e519d6c919944cc3fbd13a81e1aaae0c2adc8d371466023028d7b9806456a3d7cf002ebcf8c3d1e319e917c3da51879239452464e19444d30e004e1214cc

  • C:\Users\Admin\AppData\Local\Temp\D

    Filesize

    81KB

    MD5

    e8b548e1e160f3cf7a0502267ddebb8f

    SHA1

    7d7c00e00b05d75162ede11f9dcabe1779e561fd

    SHA256

    009c0ac0812ff94073e52cf680d0e717b889a9ca7fb06cb0b970d2a53e971415

    SHA512

    dd079d96d3f97f0fc1eef2093101ad0d09d7db2f44a824996c2ee6827263f9f794ed86925d762a01c439e4b7aff7ac4a2889a33136586c1045f5675351bf7414

  • C:\Users\Admin\AppData\Local\Temp\Decision

    Filesize

    70KB

    MD5

    6e78388e4768124b5ff3d3b9e541ca38

    SHA1

    236689af637e4a89f58217e3fb07055674a0d7aa

    SHA256

    b341a1abec32b309b5af192305858fcad49cebba16641e489a1515ee4e2269d2

    SHA512

    aece5421aa1152f6b96975aa31adaca779685fdea75c921431079106baaf3c7eb94c5d9e7acde8deea7c3d61bfc7646c02ab1c9be5f2bc31f4368f116bf40627

  • C:\Users\Admin\AppData\Local\Temp\Florist

    Filesize

    674B

    MD5

    6afa52d96eba5e077c0eb96d7cd1c564

    SHA1

    7f8b52337554efb1cc051e98b200efb4c12bbfd8

    SHA256

    5c6f959f23909576b113506aa8282fed6e29ca71c88073c655d74b473a43c0f8

    SHA512

    da431775485a01c1171c189b79fcb6bf2c1f00292aea4d9cd84bb5b5ae1530d847ba5bc32b2fcc3a9bfb68ad3d98dd20201518735202c980614a4362ab9e7b76

  • C:\Users\Admin\AppData\Local\Temp\Hair

    Filesize

    64KB

    MD5

    0b4c0561bf39d200c85e5b2397fabda7

    SHA1

    748bc191289cf41d16a142859e81b686e0666477

    SHA256

    2db3f2fd1480ac680ff635b34d24dc585d201aa24ce2446e2ebe0a9e32fba763

    SHA512

    4e6cff919c045dbac6369ab1c832882320f0216954f8db982f3e8fc810d8ef1504d2c30e8c1a0535cb3e5084fd080dc4105d893bf64bd7262b3f7c6a96bdcaa8

  • C:\Users\Admin\AppData\Local\Temp\Lanka

    Filesize

    13KB

    MD5

    d022c5a7d597a9a05dee18dc1011099c

    SHA1

    e9f3c9f5dd9c24a3dc723fc0b65a937030a8b148

    SHA256

    3c80feb4661413a4c21259fd2d3e96093084f33cfa8317639f831c487dd46a55

    SHA512

    588a2176d00cef32bcb4024f5ccc793baa281d1e62fb40cfec06b01c99769151e1e9673ead947f32a2f7484104147a056fe588c4a5655c80a60e277dfeb0ddaa

  • C:\Users\Admin\AppData\Local\Temp\Lcd

    Filesize

    89KB

    MD5

    8230047695887d69ff568d25070f26ce

    SHA1

    0c69700ec9264b62b5d93f0b2bb337100576f0e6

    SHA256

    d145dad34f18aff83f64e22cad79efbc72fd99d51c72c8b150336d7f1b376046

    SHA512

    eda6e186e44db8f05c2ccfc6f0687e56b02ccc91eb4e65797f3bfd8c502769f94781f64ebd1a262bbba9d0231ecf95081efeb3faf7aded63cffbcb13147a4079

  • C:\Users\Admin\AppData\Local\Temp\Minnesota

    Filesize

    118KB

    MD5

    a090eef68f7a54967336c05e3e3851dd

    SHA1

    3440e8647c04fb35cf1915897980f311239f20fa

    SHA256

    8822a44ba8c1f60b2a0dc8cd1bc0ca14b992430d34d79f138f241f421f596d3a

    SHA512

    bd42c7d69ed81ed02b93e2d039011277b9f230b811bb0d6cc39bda15d0b5aa58a9126048a80e133240364939170d416acfe04f36c714119afea2762223250a8b

  • C:\Users\Admin\AppData\Local\Temp\Monday

    Filesize

    113KB

    MD5

    abb7c847c105babe680a5fb8a39054bf

    SHA1

    0d9581b60bc8bae397ff37157b7a460dd7cf16c4

    SHA256

    730a9d7669e9c6708bfc976fe8c175ed991e54f2b733787c0966d07837abdcd6

    SHA512

    3ac1566510a10dea9d8fdf9b56299d0ebe8caab07232724e2be4cdadba25c0deb69664a880b38da8999dc9536c7a12e8e05af467d4a3b10483ddbc77f5c4ca1c

  • C:\Users\Admin\AppData\Local\Temp\Mr

    Filesize

    83KB

    MD5

    100a3a4b516fdb1c4c609eae4356a837

    SHA1

    5a17e90e5d2597bbb093b56f175196f685de1abd

    SHA256

    df2a36de2cf1d21a4693f2cd371d2075d25cd9e64adc8b11e571aa4c69dadd90

    SHA512

    70cd468d52c93c53938bad61d74467ad9b5a12e090cfeff1d3287df1a9351b5d68cc21ec144d53e04f550ea1f8e0d738ce128bfa592a64412f83420fb66aaef2

  • C:\Users\Admin\AppData\Local\Temp\Ni

    Filesize

    97KB

    MD5

    ac5675aff4efeebd985503d0af7ed985

    SHA1

    216bd3e4400568cbbe80a8e13b3dc0cb64b32adc

    SHA256

    2b20b6ac6d8e9d84b31d7785c455a7374b34605e5092ddde4a2cf68ee9a4d2f0

    SHA512

    3de947b53c25539c420dc5d0e453d576b88d6476876e6e442b24f2db5a558451897b17239a323b311d6b018b32212e414b6466370559a89d0e0164b5725d2dd4

  • C:\Users\Admin\AppData\Local\Temp\Noon

    Filesize

    16KB

    MD5

    f3c560e5221b721444abf14e07666147

    SHA1

    0056fc0cc4685a363bccacb7b940ee656386f3ad

    SHA256

    923f8c22cfb8cfe195cf6f87571ef752f820f02a011a34299e9fcf548e3c7571

    SHA512

    9b014dca817cf4ab2245e9b02de5c9749e8e881ac3c05ef121f443a485a562475419a7457a8165d65e6907477e492b98363965ec5d3eab8dce9c517a02d67330

  • C:\Users\Admin\AppData\Local\Temp\Organize

    Filesize

    132KB

    MD5

    37a58b9e8e3380119c428dc901524266

    SHA1

    1df675b17e182b0d14fa6ba12adf7363cf1ca78a

    SHA256

    85f907f72da3d6d70d8755295ec20236775ac9ad4b540239fcd35f3c01e8e6db

    SHA512

    21c5497627c1af970970afc0a3cd0ac5da0ecfd2a89ab395b46532994665d3de8c8e978033f77b5a97f63c2144e44dbfa7b3211a2221852ba7aed2ca1acac7da

  • C:\Users\Admin\AppData\Local\Temp\Pets

    Filesize

    95KB

    MD5

    411023364348dc27926b4d67162d1c8d

    SHA1

    223a10a0a3a8829215348dbb19132fb08cbbc279

    SHA256

    f572a2f7896b034e6340546cd27f1851890d71063919cca9ae282f40b7ea1ec8

    SHA512

    8dd60477118d72ea288306c6ec3700a8cf2a2fc18068f615d46916f36cb48db0ea3589103387d2dd5b8d430827d08841fcbfd193ebe2a07a2e17acccb1da04ed

  • C:\Users\Admin\AppData\Local\Temp\Prince

    Filesize

    98KB

    MD5

    966bdd5fb09e7294a2e79f8d83471d68

    SHA1

    65b70884b853513ccf3d872e3bdb8553e6dc6fa8

    SHA256

    c5fe1c4594bce89f0b8ac0b0fad7d71f70bd6a8f7ef7159d44f021a9886f9c36

    SHA512

    ad9292c500ebdf49a034affd3543e2484be6e0be8adb8b139261701d59b5a1fbab73c24287b885c36836b85c50a5fc8178b0cba74d21f5a914d1fcc4d3aa8163

  • C:\Users\Admin\AppData\Local\Temp\Prohibited

    Filesize

    476KB

    MD5

    e217a76827df80a70d9b6fd4d08679fd

    SHA1

    7136d228f09a4d49d77b589992a579019339799f

    SHA256

    73b69601d20ad689b0f0f301a544d1f33c1d72d004f4a5a63fb5f0fc43fadfc3

    SHA512

    0d51dfe2ec7ee49a5fc1db341a6b946ee4b217a60a28402660c190efb74e929fd8c4e9dac3cf00a2423f9cd94d9d4f7cc2bbc80a9ead38c2bd1b32ba973fe939

  • C:\Users\Admin\AppData\Local\Temp\Reaction

    Filesize

    143KB

    MD5

    b56781c2a48d1b01cafcce56bfd7b6f0

    SHA1

    29b2493f02e9d28a266adfb8822c668c49fa94ab

    SHA256

    c1b664af45b24c9f25213dd3f1236b814a9c5869103b649c21c3f5e00e4ef38d

    SHA512

    7deb2f755080b040ac62d81046502d887dc57b94358b345497d135b014a862ccb0bb3c5d8fc87ecf50470c1558604eaca691eb6c668600b997fa4627659377f5

  • C:\Users\Admin\AppData\Local\Temp\Rick

    Filesize

    98KB

    MD5

    e2c18dd49f2d796822af68904ccbca54

    SHA1

    0bd7fc429a85c16210ac56ab5b015c226c873b41

    SHA256

    9295060cdfbb376d4b2a24d91e472c019b3912f7509b7f7741465c89e0ef3317

    SHA512

    5d376b4ceafd2d6daae16f0b871dfd417b6df72f16afa78941e05c11101c81c68d6491ad9bf9a2c9e6156c6d0e963ad683ea4445c7186b2be9446f72e60816e4

  • C:\Users\Admin\AppData\Local\Temp\Tar803C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Theory

    Filesize

    74KB

    MD5

    5864f18cf5dc99d36cd9a49a8ccbd369

    SHA1

    f5d6e08918b8c87bad5f2fe99f5f2f28651d77f7

    SHA256

    333c574f32eb192a4c2f5af71d8f0d43748d35071b892ca36c06429db3ce13f9

    SHA512

    ebcd512b2ac73d46ca65cadbd1513385f70ed58a626fd1e2c6aa5438bdf5eb0740fdad3f6fb5a75f962001e54fdacd61a4399c13cffc1701a653e01137564ee9

  • \Users\Admin\AppData\Local\Temp\398587\Albania.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/3036-432-0x0000000003650000-0x00000000036B0000-memory.dmp

    Filesize

    384KB

  • memory/3036-433-0x0000000003650000-0x00000000036B0000-memory.dmp

    Filesize

    384KB

  • memory/3036-434-0x0000000003650000-0x00000000036B0000-memory.dmp

    Filesize

    384KB

  • memory/3036-436-0x0000000003650000-0x00000000036B0000-memory.dmp

    Filesize

    384KB

  • memory/3036-435-0x0000000003650000-0x00000000036B0000-memory.dmp

    Filesize

    384KB