Overview
overview
10Static
static
10deljack-ma...wr.exe
windows10-ltsc_2021-x64
10deljack-ma...oo.exe
windows10-ltsc_2021-x64
10deljack-ma...dd.exe
windows10-ltsc_2021-x64
10deljack-ma...df.exe
windows10-ltsc_2021-x64
10deljack-ma...da.exe
windows10-ltsc_2021-x64
10deljack-ma...pp.exe
windows10-ltsc_2021-x64
8deljack-ma...aa.exe
windows10-ltsc_2021-x64
7Analysis
-
max time kernel
105s -
max time network
138s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 14:31
Behavioral task
behavioral1
Sample
deljack-main/brityjaldjthjawr.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral2
Sample
deljack-main/bvnrfiseooo.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
deljack-main/gfdthawdddd.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
deljack-main/lcnbktiaiortaaewdf.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
deljack-main/mnboeplalda.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
deljack-main/nbotpasppp.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
deljack-main/tkskfaaa.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
deljack-main/lcnbktiaiortaaewdf.exe
-
Size
1.2MB
-
MD5
08e5b38dd017597e0d3ad36366d60c91
-
SHA1
e0a89d3f785e858348c17c7d12cb4e0a0de8e1b4
-
SHA256
8ad7d3398953f2badce1a7bc40900e18303f0e42f43c543355caead37aeaa930
-
SHA512
a153aa4c35d0c7660874063cd87b7adbbf307018b23e1772889056e14402354f9082b6b29c469de9c640bcdc7588f7e1cf0f2e365e09a7ec482741be85273c6e
-
SSDEEP
24576:fgUHYbdZjayfYBvx4lgr8dzINVEkg5ozw1nPum6qtzLr7xkoVKZyFlJwZ:fgU4bdVPYNmqr6zGEkMzhu3q5LrW34Fr
Malware Config
Extracted
lumma
https://xzaxistechw.live/GOaOAp
https://oreheatq.live/gsopp
https://castmaxw.run/ganzde
https://weldorae.digital/geds
https://steelixr.live/aguiz
https://advennture.top/GKsiio
https://ftargett.top/dsANGt
https://smeltingt.run/giiaus
https://ferromny.digital/gwpd
Signatures
-
Lumma family
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5620 lcnbktiaiortaaewdf.exe 5620 lcnbktiaiortaaewdf.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lcnbktiaiortaaewdf.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5620 lcnbktiaiortaaewdf.exe 5620 lcnbktiaiortaaewdf.exe 5620 lcnbktiaiortaaewdf.exe 5620 lcnbktiaiortaaewdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5620 lcnbktiaiortaaewdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\deljack-main\lcnbktiaiortaaewdf.exe"C:\Users\Admin\AppData\Local\Temp\deljack-main\lcnbktiaiortaaewdf.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5620