Analysis

  • max time kernel
    94s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 17:42

General

  • Target

    03fd3d727c6286db537d180296d23c9244708eb4183ab9f88b444d182f771549.exe

  • Size

    1.1MB

  • MD5

    108575816e00a328cba47f579faf118a

  • SHA1

    7b56265a99ebfaa714cf96643125a323bade4a68

  • SHA256

    03fd3d727c6286db537d180296d23c9244708eb4183ab9f88b444d182f771549

  • SHA512

    06141d11d2b6b7c323a66150f224e34dfe9ed33a096472f3e31108cb3556c707a78bb496f20dda627317819e176359cd9087fa55e369f8cfa43bf41f4556fe6a

  • SSDEEP

    24576:gn7QvoK8W7ThzW/nOf4NKh8zB73Hac0mXLtX4z3xJaHky/XY4O:SFW7ThzWGQ8mzB00OJa9/o4O

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://toppyneedus.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03fd3d727c6286db537d180296d23c9244708eb4183ab9f88b444d182f771549.exe
    "C:\Users\Admin\AppData\Local\Temp\03fd3d727c6286db537d180296d23c9244708eb4183ab9f88b444d182f771549.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Something Something.cmd & Something.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4864
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4048
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3736
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:364
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 460659
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5064
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Fair
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1984
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Club" Metal
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3640
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 460659\Pixels.com + Titled + Under + Brisbane + Questionnaire + List + Mh + Honors + Reload + Essex 460659\Pixels.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:316
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Participate + ..\Appendix + ..\Ratio + ..\Mlb + ..\Ce + ..\Static + ..\Jill D
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1528
      • C:\Users\Admin\AppData\Local\Temp\460659\Pixels.com
        Pixels.com D
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4816
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\460659\D

    Filesize

    519KB

    MD5

    7941357fc4a1d3804acc62528beeaae0

    SHA1

    a46242106c4fdb8c4f96118278de1572af2a5685

    SHA256

    4f07b302afa55870a6efbeb9c99ead2533be8b3fa2a11e1cfaeece015a13870f

    SHA512

    df210ac43183d15e722f96bfee891149abedbaa186a19a0eeedb84bfca2d4705ba0871d58aee8f55591db7144c1427fe46780b99c9d1d8998e835ebf59681b63

  • C:\Users\Admin\AppData\Local\Temp\460659\Pixels.com

    Filesize

    701B

    MD5

    b99af3f3811c4e725d020adde0a3cccf

    SHA1

    45d449aaf0ce0a0cabf6f9f08d2e80f58be61f6b

    SHA256

    55a14f277023e1b525b8d8a44ef166b67cb6cccd5c84db3d2c7934221e374fec

    SHA512

    9d65d6d1eba8f0bff25a4dbfad7f8c7e7d269a53097294bee51f5c3e1d0c4e987165892af11daa2cb3040987444229384cf9f095999063222df087cafc08e87b

  • C:\Users\Admin\AppData\Local\Temp\460659\Pixels.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Temp\Appendix

    Filesize

    81KB

    MD5

    b7cccb122456ca3aeaf52294caa5af37

    SHA1

    4e3fef635e5f813650c51750c3e47e15d130b7f5

    SHA256

    bf233d1c4258399652aa64b5ba61d38541dd03d4d29ca66ad2bb4874186a704b

    SHA512

    b5887cfa7eaf70591cf2d67e76fbb0e402ffad7abd9c01cc353766d28e7617db22bd0b58d5772a83dcf50b512e98d51c1c5e6ff29d726ae8d02647f4b193bbc8

  • C:\Users\Admin\AppData\Local\Temp\Brisbane

    Filesize

    71KB

    MD5

    da530e116da459da0262388cd39d5813

    SHA1

    65474e284d302ad52f33557b3085404938312095

    SHA256

    cde4eb3c9860f55de2915e05b58ec39d7dd545e566c497ff811bc7f0ef87eef7

    SHA512

    1465c3adc6555ee359d37dc0b4121d463227f03fa85c3a815db9e9467209d5a19a9312afc3c25fa7d1be3989aceb37c55b31afae280e81bd126b77c39c7dc220

  • C:\Users\Admin\AppData\Local\Temp\Ce

    Filesize

    68KB

    MD5

    96b891013f7b0febcfcbcf135657c700

    SHA1

    d69d16273b5222fdb21b3ab13d156803f8b8e193

    SHA256

    b6c91256e8869fc7cb3f7dc148ae01f4f94e9687249b69a4bca44c2dc1f40b78

    SHA512

    b908555c6590f56dee0957b5a34b7f0e2a40eb4a28b2c0d1280a8901a64cd9155ba900ac2141ba41620ade0aeefe7c5f2f7d6f1c5476af0347882e672463da83

  • C:\Users\Admin\AppData\Local\Temp\Essex

    Filesize

    101KB

    MD5

    63485660df1d41d9ff04eb1467753ebb

    SHA1

    7ed9851cad5e9732b98b91a1caa1f290f462a9a8

    SHA256

    eff4ba726f26dcccf135a839f2ba478bc23ed93a6f9dce0a7d48274a38997e73

    SHA512

    2456d93b265433e65c60c954b2da93a982b83ce85c22218e9f650f3c6528b46b8703b75c036f30627b3c0783994f6fdb21f11aa6c4414714d234e0b9ece61767

  • C:\Users\Admin\AppData\Local\Temp\Fair

    Filesize

    476KB

    MD5

    facaf7f981466435524732ece811504d

    SHA1

    bbe6f68e38a2b76a5cf1b00e86a585a3ca0e6124

    SHA256

    b0e4dfac04cca7541cf012c252bc0e0097bfa93cf3c024f7e0107dafa50ede35

    SHA512

    549c3cebfc3ac97a7a27c63acfa0b51628e55e63dfebad9800ab76490ec60955f9477cdaaddd386119ca4893ab886cf812513ab5a87b392e1611fbfd676decb2

  • C:\Users\Admin\AppData\Local\Temp\Honors

    Filesize

    77KB

    MD5

    b1357d723ecf8196b633ddf4146e1532

    SHA1

    2774fe4f3fb77746429393d0613e20968633d54d

    SHA256

    9faa39059d5dcdbb8a17d899584a452ceff7ebdcf9f1ef38d66cf6df4312a1bd

    SHA512

    2e03f7f5d77b7e4f38c16023e847c3051305f31a1d5b167ac57f35e36383c8caacb83890c033bf498be069be75847d2e499e21541f558ebd2ad675907f5becbc

  • C:\Users\Admin\AppData\Local\Temp\Jill

    Filesize

    19KB

    MD5

    11ae4b7dd5f31e0b75863181e33dd3c3

    SHA1

    945ee72a1d6ea52f576248aa32555867ffc14756

    SHA256

    73c180392c536c8ec6f4969f9f4d2adca4323e30ba0456c5a8739f805f96bf2a

    SHA512

    6ed9bd01db88dccae8bd2dace8941cdebb4d21760958d98dc4773efd1ffb8f986f3057c8b02c598c264702f19f4499edfd03b4b1c7ae4f99eba1f9f3120d03ce

  • C:\Users\Admin\AppData\Local\Temp\List

    Filesize

    80KB

    MD5

    95066a2868f6ef280bc1a1d56547ec8b

    SHA1

    fafd0af6135a8b80f8d314cd8d3a3529c4b50594

    SHA256

    a263ccea4d3a5b9a35e95c9f5e31e9c756582ddc6307333a24ce7915c7194b49

    SHA512

    7cf1355865de451a149d0c8390ed51e5f1c0f5288a1f47a8c662677117c3e55af459942727f1e77cd717b9b50a8622564c5ee945a82225a02dcba45917635c5c

  • C:\Users\Admin\AppData\Local\Temp\Metal

    Filesize

    705B

    MD5

    45c4146fad3c2fa18248262cd3faa8ac

    SHA1

    171e4d4ad22877eae9efa40f53ee44cd34148b38

    SHA256

    1a328ee0aa254950fdd4843a1234b00437cbb86b96c08b196e2b824cebf2486e

    SHA512

    0c9826e960d33d925d6adcf6f6f6e2fb59b8c8d0bc440a9c1b526fef2820ba59793a01991f4b07f42063a5287b6b2cd58dfbd4949568180e8223a3397d92568e

  • C:\Users\Admin\AppData\Local\Temp\Mh

    Filesize

    126KB

    MD5

    076ee6ffad94da31774086943be31ed1

    SHA1

    6ebd28ff7d74558478e541e47fe41a615ef2c46e

    SHA256

    26420198cf621354344718f1044da7ca94d4c74c77efeab4d34fc88694dfaf7c

    SHA512

    c8e386ab4dc31f2ae62462b827328e18060b1eef48080d0cfc4ab4242d4e07a525086d08244e57280f4e269ad5663700e31d3a4a6c8ee8bc8b9bf8c6c6f004a0

  • C:\Users\Admin\AppData\Local\Temp\Mlb

    Filesize

    64KB

    MD5

    ac45a07c25022939b7add1c8aed55739

    SHA1

    c66c49b7a5fb75367bda6bcddfd7250573fbd65e

    SHA256

    cebac74138f14d5e7b82d78389d0ecf31085c4d833941ed9accd1f0efbb58c16

    SHA512

    57f9af71ccb5eb7644de928802bca7633672ecbe6c54ed7d3c444176b95a010a65d3c609da31f001b4e4537f8aaf05f06b6d593e4f17bf9e2c9f39264c15696a

  • C:\Users\Admin\AppData\Local\Temp\Participate

    Filesize

    92KB

    MD5

    fe47517cca03a4ae390eee58cfb73fb0

    SHA1

    2207f4fe7f23ad65e1a6e67ae594a794646ced5f

    SHA256

    a07b6114f6d1ea3fcf8976be4615198ce8b3202704ab9b6401f6a999368cff79

    SHA512

    64c988b397d5e495baf63b1211f506985a73112663a825b7343550aab3b6bc8b33fff0127996317f5d4cca19da08b1440cd3c1af421dc393b5233f19ed0d4321

  • C:\Users\Admin\AppData\Local\Temp\Questionnaire

    Filesize

    78KB

    MD5

    d5d18d7604a2c4d7d9e986365af654ea

    SHA1

    130d1baec7c01aa16ca2643f0ca1954cf0bf2295

    SHA256

    c77f36f1cbccbd66fe21919bb59b78ced739026a8f6c8dfe35cd68df1ff3cfb0

    SHA512

    146bbfbbf45ca9683c3499aa624c036785317f466f15e8828a24bf3c77337409622636a36c7560876a44b17c3201dbc43550136f458d5218d55347336f52c49e

  • C:\Users\Admin\AppData\Local\Temp\Ratio

    Filesize

    96KB

    MD5

    368e44f7d299d969765a1989cab07660

    SHA1

    d82fd7bc432a6fc672b66af8417104d323cc7c81

    SHA256

    61331b2bea68291a8a56741acaefa39ba5e479a1aedcc6985475233a020fecb9

    SHA512

    b364b0a08769d9b3adadb620b21ce2d26553e35cc467f10ebc807e32e3341ded90a1e6da37efb871bf5ce13a9872f465fbf48bc80036ae178900f6279d11359f

  • C:\Users\Admin\AppData\Local\Temp\Reload

    Filesize

    148KB

    MD5

    704838265455f2774672f08bd39466dd

    SHA1

    59587e4863d56936f79f2d390813db1f615f0f88

    SHA256

    8796a1dbba213980b9fb075d134f7185e412500872e1613ada39dd038d31f4e6

    SHA512

    f01128ff0a986ac1492e0ed39044fbc5b098d2b6e60713a9252a905537a7f8f6c26a2101dc694080e8ae0442fa16a0214520faeeab7650dfb857f502b024b93b

  • C:\Users\Admin\AppData\Local\Temp\Something

    Filesize

    8KB

    MD5

    a203645419ea90289e3f99b2d067b44c

    SHA1

    ad1334d9e91e9292d6f89106934d6a4683d0044a

    SHA256

    97b3361550bb27ddbdffa302f3fc5c4fa94a7ed486181e7d927016f53868992d

    SHA512

    8d2c7c06051ebfd5d657992d5d415c979ede601b9bf8b9faac65d512db79437adabfd95e709174236ed55d8d9948008ba4e1eb9ab671f22ddb6ec3360111323e

  • C:\Users\Admin\AppData\Local\Temp\Static

    Filesize

    99KB

    MD5

    e5062c3c32cdf4b76c5cc4f45c7940ad

    SHA1

    383c5b766c78adf98e513fd543b7556d7ac3fc23

    SHA256

    3b5b4936b8cfa024d3099d32b7599f8bc3d97b0a5bef48937213641ac5a737d4

    SHA512

    ad93036b7d0e06d26cd64c58c8f2fd27373518619f3c85922f8c2cd8b9b7a2f34f6fd01e1a5ed27cdc8189cef27ab0aa49a43ffac5dc0939c5ccfb3b94c819d2

  • C:\Users\Admin\AppData\Local\Temp\Titled

    Filesize

    144KB

    MD5

    b6910abb1d8b8c98b8dd2273222ce7b6

    SHA1

    95b9cf4d62fc05f5689bff48c319bc45b5e608e8

    SHA256

    440021f0bcd7f4175eb26f0576297b2224c4e728750f423aa2426a9c2ba1b238

    SHA512

    a1111fac0b8e2b42ca89f088ebe405f98d793d9381d849a2cd0343aa54a6443c815c0acb9ddf156fce68d627374da921bd5835a245d6b4cd047fc516abcb04b3

  • C:\Users\Admin\AppData\Local\Temp\Under

    Filesize

    99KB

    MD5

    1cab9f6991aedf9943fdd849a8805685

    SHA1

    896c32960b431bbbfbc816492a1fe1bdefd8a3d3

    SHA256

    86ca71f5fcf5a61199e16527b54ca3b438a04c15e764d0f63c96bd5ed0085a3f

    SHA512

    a5e95787c4880ab14ec6d10fcbde407a8ba5e6714784aa839d4dba6a245aace3bd5c78c504b85101e70a183b1a74cac2f1869d88178c334c4cf5479959b9ef5e

  • memory/4816-266-0x0000000004970000-0x00000000049D0000-memory.dmp

    Filesize

    384KB

  • memory/4816-267-0x0000000004970000-0x00000000049D0000-memory.dmp

    Filesize

    384KB

  • memory/4816-268-0x0000000004970000-0x00000000049D0000-memory.dmp

    Filesize

    384KB

  • memory/4816-270-0x0000000004970000-0x00000000049D0000-memory.dmp

    Filesize

    384KB

  • memory/4816-269-0x0000000004970000-0x00000000049D0000-memory.dmp

    Filesize

    384KB