Analysis

  • max time kernel
    93s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2025, 14:32

General

  • Target

    freeh.exe

  • Size

    11.1MB

  • MD5

    3ae58d01ddf868998a69cce47ba09835

  • SHA1

    eab8b2bf9fb8110d9e5f5242527a594888576106

  • SHA256

    d493b9b04b220831949c9cc49fa87c268e3327cefcc41d19c0dfc59f150c021b

  • SHA512

    c044e8f8f402697919042540b03aa4722367fa6f3bb1d1855cdd88ab13a02b7e4416d9945cc86a2381eb15b336b4c720c25972fbc3c7ed742ccbbc8916721884

  • SSDEEP

    12288:qprynNamom0VdpHJXdjn2yW4iH9+jPmQJP3lxTAvK:qpryvoX3pp1fW4RDmQJ/zTAC

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://toppyneedus.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\freeh.exe
    "C:\Users\Admin\AppData\Local\Temp\freeh.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Users\Admin\AppData\Local\Temp\freeh.exe
      "C:\Users\Admin\AppData\Local\Temp\freeh.exe"
      2⤵
        PID:4380
      • C:\Users\Admin\AppData\Local\Temp\freeh.exe
        "C:\Users\Admin\AppData\Local\Temp\freeh.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 848
        2⤵
        • Program crash
        PID:924
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3380 -ip 3380
      1⤵
        PID:3460

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2608-4-0x0000000000400000-0x0000000000460000-memory.dmp

        Filesize

        384KB

      • memory/2608-6-0x0000000000400000-0x0000000000460000-memory.dmp

        Filesize

        384KB

      • memory/2608-8-0x0000000000400000-0x0000000000460000-memory.dmp

        Filesize

        384KB

      • memory/3380-0-0x000000007454E000-0x000000007454F000-memory.dmp

        Filesize

        4KB

      • memory/3380-1-0x0000000000360000-0x00000000003EE000-memory.dmp

        Filesize

        568KB

      • memory/3380-2-0x00000000052A0000-0x0000000005844000-memory.dmp

        Filesize

        5.6MB

      • memory/3380-7-0x0000000074540000-0x0000000074CF0000-memory.dmp

        Filesize

        7.7MB