Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31/01/2025, 13:33

General

  • Target

    setup.exe

  • Size

    80.0MB

  • MD5

    c804e1074af9d7cffa16e6bd084bea42

  • SHA1

    dba96c1d8dd56520fcbc65b1d1dd0a8da91e81c5

  • SHA256

    d0710b55aa4f4424d4b14ad320e6615dc230f2af271a1f260ea475141f9d0091

  • SHA512

    950a9a8822cb6df38d710cf1341a79ce25e76e8f145471167dda49f8e6c9e9b22a88836d51ee69b4770c69cef3d161be7fc408de336d1d8a53f1bbad40accadd

  • SSDEEP

    24576:0/8vj/qTTY54U9wn04+riuApVGgH7x86jeIGyghi:HKrHn8Xy3HtjePymi

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://toppyneedus.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Fashion Fashion.cmd & Fashion.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2604
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2672
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1992
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1664
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 224177
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1684
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Wellington
        3⤵
        • System Location Discovery: System Language Discovery
        PID:292
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Tranny" Yale
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2200
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 224177\Benefits.com + Photographer + Vacuum + Separate + Valium + Continuing + Training + Hours + Kissing + Accepts + Verde + Quotations 224177\Benefits.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2008
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Searches + ..\Coordinated + ..\Students + ..\Approve + ..\There + ..\Molecular + ..\Updated y
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1964
      • C:\Users\Admin\AppData\Local\Temp\224177\Benefits.com
        Benefits.com y
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2312
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\224177\Benefits.com

    Filesize

    1KB

    MD5

    7a673a5ce6a644ec84c2415fda2059af

    SHA1

    9c931c0183242284fb957e4f98cda3017c80ebc3

    SHA256

    7f00f9b8f9c31474f68b1cdb9982b523d74d95b652f9af3f6de2a2c829f3232f

    SHA512

    e85c9e2afa4ffeacc4f5cfc240cb8971426e985bf2438ccbd5022e943897f02f025782557309437c53782d6a96896b03e29ac50e7d661543e4c2367700402b3c

  • C:\Users\Admin\AppData\Local\Temp\224177\y

    Filesize

    494KB

    MD5

    69958243bc5c2e5c6095c302b3553ea6

    SHA1

    5290506b80c27a8390452c74180802e24a99a9e1

    SHA256

    bb07af249bf75123f4101918f83db1ac3f35bd3b25c07e24dc90f112797916dd

    SHA512

    02271f91deec06acf9609125b4b62cdccd12e4233d39c47233e33557427109549d2645809ed9161a3946834504af9ac11e9f8aa1d2c2d989b9bc39e27392feba

  • C:\Users\Admin\AppData\Local\Temp\Accepts

    Filesize

    118KB

    MD5

    e00c2e4747e1dbe85f4ef7ac364713d2

    SHA1

    b1faa76a14a9ab5b0b4de38bfb342af32a67c520

    SHA256

    599bc7de6330ded6d1dc02745bd0f1f1ee47c94b9916c77eaa7a6ccf716e4b56

    SHA512

    5216f4d623bb24149d761333e5db0522b65531df807c4b2aa30fe3b90dbfd67a664da392efe53ca289ce8de88686359514f857f248ac8c4e604ab19602630f99

  • C:\Users\Admin\AppData\Local\Temp\Approve

    Filesize

    84KB

    MD5

    70749708f82f6478c9447eaa6424e676

    SHA1

    893782a94dbfe80e69acd8e566ed01bc9ba4da2d

    SHA256

    9109513040827daf8261ab6d67673e5fa1ec7261cd18cd93bb94ec7bc10ccaed

    SHA512

    624d217da8850ebaaa592791310699dfbe52a1733266ea389a908c3e1c697f8947d336e07b834ddce58aac4690b3832ed9504ea4c595c3b34ddca47e2bf2b852

  • C:\Users\Admin\AppData\Local\Temp\CabF8F1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Continuing

    Filesize

    93KB

    MD5

    dc66d0464185b03bfe2a8260383c81c9

    SHA1

    df7e225a3854ec88cd70637b2e6855f77dcbcd0d

    SHA256

    7a98fb9cf35efa46a9f79d2427e487dd3265b9a123fe4e35e840ff8adb439163

    SHA512

    d4b4ab5ef3ffe765e960fc42fcba2b0f952d62af59bb0232b4e0cc5664584389a3f2269081737f241ef426fe264bda50b09ee76815e56b3bfda942da4d856199

  • C:\Users\Admin\AppData\Local\Temp\Coordinated

    Filesize

    65KB

    MD5

    a28e0fd0589cf3ee47720c0c92badf5d

    SHA1

    aee3105d5c4b9b0027ce9a28ef2bfa00478107fb

    SHA256

    428f17428e1d81642af3ea662667d3de1813b92da57fd9f1da8a5f0b1b86a2ce

    SHA512

    140d6d0445e611676fcdf0ef24ad6bd7ffd14b5a2a8f5d8aaf617afefcac48fd5f2bb07012db641f24c71e0d871d8278325c3e5d3738520bb4c652edee0053c5

  • C:\Users\Admin\AppData\Local\Temp\Fashion

    Filesize

    13KB

    MD5

    3920a54c66b165ed2257b65941318cc5

    SHA1

    c55e948965fe55152671f152638b190fee98c83a

    SHA256

    6c8b78c5ebbd2d83f157a0d05beea1ecbc293a6f272768aaa35b9dfabc99e610

    SHA512

    0473c5e86c165c7f16a254f62930a12ded3e2f17d80f76ced33fd3475696d739c2b10077e5f076b4433dfe8cf237d39e5b667a6a798e13f2a1dc23df79d225f4

  • C:\Users\Admin\AppData\Local\Temp\Hours

    Filesize

    121KB

    MD5

    cf91c73a94c610c69b320295c8dad484

    SHA1

    072eea695b66b844368162fa6b364303b8225cef

    SHA256

    b2c059189c73b2238d6541d5cd374ab26d76c37de816c35b273b1075ed96cacc

    SHA512

    358c2473ef23865c84a21487b949babfa9bef3bf5d5dde3355316282a27bc70e1119cf2874543c64295975cf46271290b16163d073b2dd612892ffa636a3a2c8

  • C:\Users\Admin\AppData\Local\Temp\Kissing

    Filesize

    78KB

    MD5

    790cab68480da239a8340e419e741dc4

    SHA1

    6a452363588ef0c76c6cd0aa06ded84081e6473d

    SHA256

    aa9048b39a86f5740b0c67af9015b4338e5e30b3260661267a24b13f72b27e3d

    SHA512

    8174d075c5b9fcb1d7591937da3147947835e11c656193ffb36013fe3463afd38cad5f9ff91864640510fdc8cde9f8dfd1a47e5a8f652179ebfb1443dcd30d83

  • C:\Users\Admin\AppData\Local\Temp\Molecular

    Filesize

    65KB

    MD5

    0183dbff21a2cbf2ef2051f92fb261ea

    SHA1

    6311b1d7d18d9196bca94175bed8bf00421e1d02

    SHA256

    4155aebe1d5968e2f2bf007ddb715bca2d3cec57c641e57a7d7406e767f76f60

    SHA512

    6e2b8e075b491387f80e4eed11aa43d9fd6735ea7ff9599d61f98108630253fe81a0255547148d85a5f733987f257e23666291bf56f72d6baa5ba939adda5016

  • C:\Users\Admin\AppData\Local\Temp\Photographer

    Filesize

    61KB

    MD5

    34fc9de0e1ca03ef501f44959ff2a326

    SHA1

    c979cb07e3cd37b04287c171e5b2d627b6fb1571

    SHA256

    a68bb7207aaacd1b7fd4ee1ab4dafc71bd464cf3386f7a1a4753391ce7a7c25c

    SHA512

    1e4b43a54ab2342be65f2f9007ff45ffd0053477cbf5b04e259e73eee7c4506828797dc559eacfb08499a3f90e1142f58ae1e05787341df614b42a2513e7e6ab

  • C:\Users\Admin\AppData\Local\Temp\Quotations

    Filesize

    2KB

    MD5

    27913dce14bdd76823839e1bfbca784f

    SHA1

    02c2fd9ab4bfcdfc1b1429ccc3084cefdf457164

    SHA256

    b58d374b43b871d5d309dd55b68e4dbe3373744db8e11da3eed17f80a972b240

    SHA512

    2f3df0dbd99b8c191006e652713c7505a2211e7d081e2d65541f0651668bd0a6c18e4ec6459080c6885be0a3211c0be82f58de546dc9d6cb7be2648311c6560d

  • C:\Users\Admin\AppData\Local\Temp\Searches

    Filesize

    54KB

    MD5

    121cac13f89f021d263f4f9d1667492d

    SHA1

    b5a5e2e45cda0521c423b22fb2ee31c5e5970458

    SHA256

    56f941163f554fe29969f6d01bf3a1d1bcdfc995e8b502aa929f4796568e7761

    SHA512

    fc32c9355ccda57c92a7013a1a0b8e56543c4bfa1b62ab7c3e7235dfa90c27a918b50c68025da755aee36186fd928119a76b1c019ee3e243d0820348056e6993

  • C:\Users\Admin\AppData\Local\Temp\Separate

    Filesize

    93KB

    MD5

    1566eccf93e2cf411095ae7d38f9b538

    SHA1

    d4d1b7ac1b4b797fe4f5be148edd67086b423ce5

    SHA256

    c85d1d34b1428742a37a9d5e70da2c117dacc261c8c80b71c5cc9d024bd693a4

    SHA512

    955c339107f9b5c7da04695b6a7541eadfa6a993d1556814e09d48b11e3bd2ba984d848a4ce2293cfbb724ab8d5ef022af083b7e27920cc561dd0fec2f3c90ea

  • C:\Users\Admin\AppData\Local\Temp\Students

    Filesize

    93KB

    MD5

    447b140c1f12cd49016afe335c8c51c3

    SHA1

    55a0bc8373c2da82fb292c491c9b73d0bd253ea0

    SHA256

    c11a882371a911cb7432500f394ae8ec19e28755b9cd2c66446df4ac61020292

    SHA512

    3fac38c13f0ca17fe5afbcce5789e075706c4d1669aff31ce78966661207052d12f7833af51c1053b5cfac5cda6dd761133e442f78b18c50f69966b2a8038c3b

  • C:\Users\Admin\AppData\Local\Temp\TarF913.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\There

    Filesize

    94KB

    MD5

    86e877927a1c9043a7f1ac211569c47f

    SHA1

    dd4ad496d98b1804ef7c312d7d72fdd28a7a71f7

    SHA256

    3bb527137a86322c9bb94d12d96337c386c0bdf21ab0188e88f7b5aa5565b287

    SHA512

    e2345b1e3b568df6089bf880e48756348b3f41c893d1f38c845895c9a36bd2f3f217feaf8440b66d3ecfcb23a4ceba102f9be9c53af58cec979a3c2662829e98

  • C:\Users\Admin\AppData\Local\Temp\Training

    Filesize

    132KB

    MD5

    22fed7224b5d03cc9a0388a08771838c

    SHA1

    e8380a47ab0c67d478d7b54af35a0d0e998d96fe

    SHA256

    d8726603ea5d8cf6dd256d110906da259967b19380ba7a334fae01265a6bdae7

    SHA512

    867dbf9432055ed4a09b95c4e21157a9ebd998ad4767f979601ce6821f660fefaba89919327baf6196e9fb7b78f1495e048d4828c4b8981c44fc5db84a0d6b8e

  • C:\Users\Admin\AppData\Local\Temp\Updated

    Filesize

    39KB

    MD5

    ea1f9fdd115297d606b829a08d02dcf2

    SHA1

    972c64393ea525f29cb8ee75257772fe48fb8d43

    SHA256

    cb8eee0984fda76c6df07ee2561cb59510ba80236f96778dc4f66dc5d4145da7

    SHA512

    0fb6d333670fe12f7ffe4ea4ead804bc1d027150a6af94c150729c0bc4779f79a2f679e62e3a90c0ce749723500db4f7232439b97eaf975faa5584f6eb07cf1f

  • C:\Users\Admin\AppData\Local\Temp\Vacuum

    Filesize

    50KB

    MD5

    5264ef29af53ab79b9be0e48d8d25e1b

    SHA1

    c25c09d953ed58fed5a37860f3709e64836792d2

    SHA256

    16317bbcf81301fa60999541273e1ea6d779b089116fe9f56b328cfa9a656201

    SHA512

    8f1ad44428223b9271cc4785942f923e7a2a1175f0f0b4e544f1c57084040615abf3545d61fb0c06dd9761b9d144017aaf816f0ebd72f0aa43357dd3629255a8

  • C:\Users\Admin\AppData\Local\Temp\Valium

    Filesize

    76KB

    MD5

    f924d29b65337dd04efb400ecdbbd9b2

    SHA1

    15680e3e880418deda966e0a4a3e4b67cf4ce3b1

    SHA256

    33626952b53b46b58ae32c4c7d1a4b054551518c9e050267a2cad863c6d7a818

    SHA512

    0eefe4043390659d2a25c548b705f73257ec998ab9fed576535aa85406f8a8ba9526e5525583f6d91988747badf2f0b0f992ac412c41b1fd7ff2c86319e1fb90

  • C:\Users\Admin\AppData\Local\Temp\Verde

    Filesize

    99KB

    MD5

    a271c89ee02656f8a9c9dc6005a767c1

    SHA1

    dc1c94ca8dbe68cce95f5d9082efa01c9131fb0a

    SHA256

    40d95ad335ddffb637f4e569b19a3dd973d25021fc08e219c20a6b789add043a

    SHA512

    1cd7b91f63d14932d033a871b5cb6ab9bd692cd10a403240fac1da0d74c80f622f3b5723d1a746af867627ef1c675f7fd6625a11c2fc04711ae57d627677c530

  • C:\Users\Admin\AppData\Local\Temp\Wellington

    Filesize

    476KB

    MD5

    ee93c2f04396717910abbfbfd9a151fb

    SHA1

    29c4c6a67457df0fa39c60a45a6fd698c3dc484b

    SHA256

    abd5e91c3960dfbef083c3e63b933e7176168a4b160b782299b9a5cb36943eb3

    SHA512

    cfd7a18dd83cca89256dadc8118ce6c4b01eff6085e024bf7e53264a23c5d0bdc3be8e825ed747cb40514da14f2d1b1ffb60bba71c7b254e5f87607bfe79c7b7

  • C:\Users\Admin\AppData\Local\Temp\Yale

    Filesize

    1KB

    MD5

    2110d5656fe3bac9acddcbb6f981d424

    SHA1

    0d8ca0ef393419ca1ca453e6c34b7c65fc60b6f3

    SHA256

    34846ca023d1742503c2eaaeb6c797268e15fa71dd2fcb9ac4e3c102a6207875

    SHA512

    826ab8c4f3252f0a31087e8a6601f9d3bdd9b47a1629f5546210547f994b5aeb11a77631101aba3ce1e0caa2ce992c5442df774c46794817d363e5046b7b518b

  • \Users\Admin\AppData\Local\Temp\224177\Benefits.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2312-379-0x0000000003610000-0x000000000366F000-memory.dmp

    Filesize

    380KB

  • memory/2312-381-0x0000000003610000-0x000000000366F000-memory.dmp

    Filesize

    380KB

  • memory/2312-380-0x0000000003610000-0x000000000366F000-memory.dmp

    Filesize

    380KB

  • memory/2312-383-0x0000000003610000-0x000000000366F000-memory.dmp

    Filesize

    380KB

  • memory/2312-382-0x0000000003610000-0x000000000366F000-memory.dmp

    Filesize

    380KB