Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 09:22

General

  • Target

    voicemod pro 1.2.2.7 crack.exe

  • Size

    926.5MB

  • MD5

    593f3787d5bd833103d456b10d35ae30

  • SHA1

    858dead6e850ad056f5f20a2ba58b18baf752d07

  • SHA256

    03208a9496a9c1accdf26285e0dca26100801b6571f6e0ea2863cc366fb54717

  • SHA512

    b5ae96379ad20a989d1bf16d4a36c6c8604b01e942b89152fc22ad44cc5c3f22b2a5701e91918654a4abf029328016018d2e7d7b7d1868bc1b2e4def8bae0fc1

  • SSDEEP

    196608:3eOBFM6TPvs/FVualRJrTytryNNbCmCYstCHAwwk4VFW1FOmOldPdr0xYw7O6au:3eOY00/GiYUA7wwk68nADW6sf

Malware Config

Extracted

Family

lumma

C2

https://foodsktyproject.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\voicemod pro 1.2.2.7 crack.exe
    "C:\Users\Admin\AppData\Local\Temp\voicemod pro 1.2.2.7 crack.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c expand Casino.xll Casino.xll.bat & Casino.xll.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\SysWOW64\expand.exe
        expand Casino.xll Casino.xll.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4800
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3372
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1424
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4892
      • C:\Windows\SysWOW64\findstr.exe
        findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3256
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 34412
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3452
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Nerve.xll
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2212
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Harvard" Bright
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1464
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 34412\According.com + Word + Henry + Society + Urge + Sanyo + Consultancy + Marc + Pod + Despite 34412\According.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4120
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Aerial.xll + ..\Lending.xll + ..\Passengers.xll + ..\Centers.xll + ..\Choose.xll + ..\Fe.xll + ..\Squirting.xll + ..\Thompson.xll O
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1540
      • C:\Users\Admin\AppData\Local\Temp\34412\According.com
        According.com O
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5696
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\34412\According.com

    Filesize

    746B

    MD5

    bc745194159a267832536bde84a6fcba

    SHA1

    bfbe0b27ade92d40fcbcf017479b2df1ab4c2b3c

    SHA256

    f62b9ecea19c04ccbc651b5ed7702919cf8ae1a77d204e27cba427b5b5c4dfde

    SHA512

    752ba10472848fd64145919090e0da575c258e5bd1b5f6d959384cb88a8b07bb2a030f770dd92d4e58cdc1ab468dd7df99e6ffe3ac00308d1a800d231c8ca929

  • C:\Users\Admin\AppData\Local\Temp\34412\According.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Temp\34412\O

    Filesize

    539KB

    MD5

    0c70ef1008904d708de0599eed62e40a

    SHA1

    7f748f37ebf0081b310fb5828fcf57736866567f

    SHA256

    76c205eea69754a54555f5b19354a2da7779e1e3a24dbf48828df39f04cdf025

    SHA512

    f16a7a00987c4225ed5543bc4b839885e85180fa61018a28774419d189081d33248025a9fc48695e44db5d05f47654f84d0883ea3142235c8568c381f822ccec

  • C:\Users\Admin\AppData\Local\Temp\Aerial.xll

    Filesize

    73KB

    MD5

    b6da650f3bc32b10fb12ff276f4db180

    SHA1

    d31b15de677ca6818295cbfad36e2bda00f7cbf8

    SHA256

    0d26df1e6c82c1ab668452e108421f89f5d6a07e2efceb3560dbb767af86babc

    SHA512

    d886df5daa26acb5a32613c40c9ca8f233496b116ef89ba696aed8283eb302d68dc6a356f2b76bc30067482598e651e59f87297b165ca2cc99afa14987b1ba43

  • C:\Users\Admin\AppData\Local\Temp\Bright

    Filesize

    753B

    MD5

    6f60adf9e58af8dbca1cfdbf5301273a

    SHA1

    19a5863a6541c6dbb061acefcadb829006dac879

    SHA256

    19106f4c3e35327ad2a3e65682c9429e52665a9b0de2e97b9e755a76edc51431

    SHA512

    a0e480e7798bcb2dca8b53506d91c15a52fb495345ddb9641c6cdbea249c8b86ab417032dedcda12cab709fe7bd37bac970512e6ddc75bffb1a353467f6ef8f2

  • C:\Users\Admin\AppData\Local\Temp\Centers.xll

    Filesize

    67KB

    MD5

    e7cb29925acf3dd4bd5741c37cefd9bd

    SHA1

    c54c920fbb455ad3de8b77a0f8f90dd637c1faa8

    SHA256

    a38fd737f9bcafd188553dee4d35a0701ee7961b27e93e6fddd8cbcdfc4c49c3

    SHA512

    08677bbf8f0a87847881bff198a468e46578b07b18a6dd257d207f9790c358d2c0bb96a8e044227a5b247b7b1049b4f836b96323227753efd1a3e9c76e02172d

  • C:\Users\Admin\AppData\Local\Temp\Choose.xll

    Filesize

    76KB

    MD5

    ea8246b5c5f8afd0c56bce96b67a38be

    SHA1

    88634ff2bef01cf2050fca049ac84d6d9a71960a

    SHA256

    db932284eb050653aa1c5ca43215d647297aa003a746598c10f3341a3c0e4517

    SHA512

    30f8ec51518595581456481f0710801db2f3bdd7f3e22af461d2b6d9733efdd28c67ae59099f114cc8cb512ce01dce39f1d24dbb175f474e5a9044c522bf8bc2

  • C:\Users\Admin\AppData\Local\Temp\Consultancy

    Filesize

    134KB

    MD5

    f3d8d8cb7a65c065e6607a143458d578

    SHA1

    b247f55f6ea2e56d138d202f3405362a7517ef69

    SHA256

    53ea6fa8d4cc588c47441c917380123b7194a3e6ce2e6a434331c5c438750ae6

    SHA512

    bb749076f0c172a9bf3152b8270cd503ed80761ea881bab3b704fc3a008d8abefd7583c7db2316b9d3a318b94e4e35d118e922e4504e2c312063a2e40d0f67ff

  • C:\Users\Admin\AppData\Local\Temp\Despite

    Filesize

    35KB

    MD5

    8a0143d77ea7d1938062373e6cad3817

    SHA1

    1bf693e8e39565a5b1f9178f342f1263b2742441

    SHA256

    6ffe1a7e36bee6976b9915be3b62445db198f027f049249f631baa5e2d581193

    SHA512

    29af76e8ec7e58b5660f085c69cccf45a5416137d7625407e6a02894a3010f1faebdc52c20ba56e9e1dd6795d39f6978b4c6ba7d924f74275e3187457f52efb6

  • C:\Users\Admin\AppData\Local\Temp\Fe.xll

    Filesize

    86KB

    MD5

    210634d53ffb4443a5ca36ba0cbe5be7

    SHA1

    64e3a18c6fa33c669d7e2cb029ad9bb990a37a20

    SHA256

    c351fdbde77eefc8113e8b1949f5794c36b53bc722356fb778e5ded601be3cd6

    SHA512

    368b9e04aaa4f1e405dc943095984c98572e4c264f9af10cc6c59807c5872be8bced8fadd6e30ee5d44ee86ba58668a916a63b32e4a9a81d98c454defdcd72e0

  • C:\Users\Admin\AppData\Local\Temp\Henry

    Filesize

    142KB

    MD5

    5061a2126455f10ecd09827c7264c18d

    SHA1

    e0964bfa8f7cdf4f59e66f4d804eef12324f83da

    SHA256

    8591fe8627273f74806336e394e1441cd30cae17ed738d5482b4bd90809f9b09

    SHA512

    fa6f63b07e84abdb3f6ac04e6a8ec183efae88fe9786dcdcbd6466e0a055826dca75dd28fa348dae48354737ab6cd6d7062e4d89732aa2eb9bd7e4b3f373711c

  • C:\Users\Admin\AppData\Local\Temp\Lending.xll

    Filesize

    88KB

    MD5

    8552d9d2d3a09a2de2b45a117a6b85cb

    SHA1

    7a0414434d3c5b38f9864e2a57646315dc85fe46

    SHA256

    41073afa6b632bb797f0465a0bc4648bfa438f5da25c00332794e9eaa6d655a6

    SHA512

    4c942dd5b1f3e0c8ecae8f12e1a10a1c01f4435055d3e4953f7824ef05913ac9aeef96b98c640d0d085990bcf96011d0ca69b19d9339acbb2c5f5613ed63d1e8

  • C:\Users\Admin\AppData\Local\Temp\Marc

    Filesize

    68KB

    MD5

    2dd80e06f9548088778a9a982039239f

    SHA1

    05b432d791605596d6b56d8073c2f9dec1962a87

    SHA256

    1f87c5321c8ee915e81905062ae80e9aeb3dcbac616ef13b58e8c09d4fb68f1f

    SHA512

    c08797783b1753110e40598aee9dfbfc3038ee0d76ccbd7fc15b41828ee1a750c45b7f722bf340c866124e63cd9f586a6ff85737eb7e1a6257b95124ac5ccac8

  • C:\Users\Admin\AppData\Local\Temp\Nerve.xll

    Filesize

    477KB

    MD5

    f6f5c335fb7e174757b306b1dc1ade16

    SHA1

    2def4e0d0f7dc714063eaa0985ac74401e593ae3

    SHA256

    0fdab57f7bd9f614bfd9e693574ac06f285b0240486d52ae3c80353382ef7a84

    SHA512

    69b86b724654af9e8ca49d8d0d0aa7fb077fd52b3994da29af2031fe3f6e1b076dc4f1a546cbcaabc855f8472703d5f5ba4daa2001164ee7c1608d4116e8a686

  • C:\Users\Admin\AppData\Local\Temp\Passengers.xll

    Filesize

    59KB

    MD5

    efc624376c18e43e7507c2cb99f35f23

    SHA1

    60cd90b26e795e587010187e9ec8905e8c8def80

    SHA256

    5de1707c3b2518158a4df1d305f3a2c4c385d038be6bb103cfd3e68b3210868d

    SHA512

    65f5eba0adc9da4b3148272a47edfc3c35a6dd08d34696ad0ccb752006f7d26247811fbb94348e7d75f1b3e1bbbb76fbe3530c1510716b0a044b50bbe2069274

  • C:\Users\Admin\AppData\Local\Temp\Pod

    Filesize

    92KB

    MD5

    a922a49f4fd5407e910735200c7b3c7b

    SHA1

    4d3822b46ab6639674befde7294365cd53092a86

    SHA256

    038c480ea4d804ddd07473c9596c9d68766945d7ffc697047e66f7f7c6af11b6

    SHA512

    4e6407d4d7522a8ecb5d31d9673d0fce34a7e7415a6ab91980903f961f60ebb684d167ec2d93242b2572a3487bbd9deb4cf332fc29c92fe49209a1f414abd9ed

  • C:\Users\Admin\AppData\Local\Temp\Sanyo

    Filesize

    120KB

    MD5

    cb253551bb7c7520ecadfa0db06e5139

    SHA1

    6a0155f8596b6daf677e1cb4edce5cf3d62bec59

    SHA256

    a4d9d10dd4514b8e4575f9b8341c9a687309ef79137dd99dd40e00668046caf8

    SHA512

    1e1d86c2249429a76b42e440a8ab7ac84b1a31dcab6f40756fb19fe4700b9404ea6d973b33c3e16b980c4e1ceec7dcd63c66faa48fa4727f398a8d10af9f3f23

  • C:\Users\Admin\AppData\Local\Temp\Society

    Filesize

    133KB

    MD5

    b4d3ff457e285c8f973ebe85d45403ac

    SHA1

    b1c1241a8953020e169f3076f6fc2a4d83c27733

    SHA256

    f91a7700ceb66f309b3b47e55edeb5a025c6474d4e690ecf7a12b12433ffa123

    SHA512

    ade787790fcd548543c1e5ca0b618088ecf767b39f0fae3a4cf1ddcc82839aeb5141f68bd6f9043f98743efa9dcef8ca2e9b5579f5617b2f9fec372617e2c0de

  • C:\Users\Admin\AppData\Local\Temp\Squirting.xll

    Filesize

    82KB

    MD5

    d368c79b396d868de1c4b3d34316c7b5

    SHA1

    c0ed130c5285f38f10a61cf4062b1ec71d8fa541

    SHA256

    8281d1faed4bd4520b675939df525336fc5c04378d7c44a3159399a637fe7c4f

    SHA512

    569fcec2e9f58a53eb4b401bab5e87327bfe5e4fc6c537354dfd9634796145ffe68dc484a2b1cfe21f7e6b4cdc0aa255f496743cfff7b2c7d4ea520caf51d494

  • C:\Users\Admin\AppData\Local\Temp\Thompson.xll

    Filesize

    8KB

    MD5

    8a09079839a59bb5f1765ef41e3559aa

    SHA1

    360795e1c849d0870eca931d3c752aa58eddad00

    SHA256

    614292a48a7a4bf4b2978daccc018bfddca28e7d8c0357afee80e34b6db6a7ba

    SHA512

    fe91e3de310901680c1cadb286b5232a8ccee3cb848f1a88a4d5b08885c2a69a71f317829a90218a50105565eb3d7841723a95aa7e4dc5ee0a4b8077129aba90

  • C:\Users\Admin\AppData\Local\Temp\Urge

    Filesize

    95KB

    MD5

    0ea869ca9b18406a52fa1ae6271164ea

    SHA1

    8a170a2f648e30cd1c1b6723ffa77ce45e5ca7c8

    SHA256

    bcb1d16c2aeda8aafd925b28b9fed30141361c3b1eb6a4170487d5b7b5a2ae87

    SHA512

    73e99ebf81690ef5246f615be2a322021837540d803d53351beea2b5f45be379323f26cd1c8c19bf62c265065c206c93a5f1e818f5a80ca9bac6b90bd5bf3cc0

  • C:\Users\Admin\AppData\Local\Temp\Word

    Filesize

    105KB

    MD5

    4a9e8dbff979fd5063fc1d47f805a59f

    SHA1

    201871cae385ca06f95dfc4f9a4c10c28f995a83

    SHA256

    06db52213d88a26416e3909ad9c3c6d4e7bbe619163b4d314ed88d1d0f92c049

    SHA512

    b27d91421d33a53ea4dedc3fcf14fddf52fb59acc0b0b432869335a1660fbf3fde973e3308e379e621b40653b25079e0557bf10134ae4192f506ea589c957fe3

  • C:\Users\Admin\AppData\Local\Temp\casino.xll

    Filesize

    30KB

    MD5

    9571131323be90fe8bc297ec2dd6b973

    SHA1

    29e0e6ff1ad434bbfe8056be522e1c55b54eb748

    SHA256

    772204e17532f29016bbcf844c1320dc77a48fe66edd9a9cce112cff92111b64

    SHA512

    cd497283d7c91909401214cb9a2f49232deefa5bdf79cd9edfad6eb4aeb082acb87e0c0a8bb5742686a1811363f0e71d4832c84630e9cb9f42ae2b2172b72efd

  • memory/5696-70-0x0000000004B50000-0x0000000004BB3000-memory.dmp

    Filesize

    396KB

  • memory/5696-71-0x0000000004B50000-0x0000000004BB3000-memory.dmp

    Filesize

    396KB

  • memory/5696-72-0x0000000004B50000-0x0000000004BB3000-memory.dmp

    Filesize

    396KB

  • memory/5696-73-0x0000000004B50000-0x0000000004BB3000-memory.dmp

    Filesize

    396KB

  • memory/5696-74-0x0000000004B50000-0x0000000004BB3000-memory.dmp

    Filesize

    396KB