Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 09:19

General

  • Target

    1980-39-0x0000000000190000-0x0000000000480000-memory.exe

  • Size

    2.9MB

  • MD5

    1840404086202ce8888b2e9b833e6cf9

  • SHA1

    5dc2dffb8e87724a6ed2a10b10f1428d3fbbbb7c

  • SHA256

    c00321aab298b81dd507d19048b435303a5472a2e8b97a854ef41ba86699659a

  • SHA512

    a8521e55b0bda0b2e5b32ef7d356e70ddc1002f3f045d5b26180d468dd59617bc62b87c2ce6367cf5d569972daa961df439b3aece9af793c3fe2b5ded403723d

  • SSDEEP

    24576:ZYmFm0c+4Lt31e+obm4FpievW9z/tw41GkXG/SmdUGTceTtr4Wvt8/EX5SCxMPPt:m0c+4DdnRP/F1G+GnT8EfxuPn5OgI

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

https://fancywaxxers.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1980-39-0x0000000000190000-0x0000000000480000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1980-39-0x0000000000190000-0x0000000000480000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4864
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 224
      2⤵
      • Program crash
      PID:2360
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4864 -ip 4864
    1⤵
      PID:4828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4864-0-0x0000000000A40000-0x0000000000D30000-memory.dmp

      Filesize

      2.9MB