Analysis

  • max time kernel
    194s
  • max time network
    301s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-07-2024 05:04

General

  • Target

    6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe

  • Size

    529KB

  • MD5

    efb9f7b4e6703ad5d5b179992a6c44f8

  • SHA1

    6f51ff5a147570a141ec8ce662501c21ff8b3530

  • SHA256

    6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314

  • SHA512

    389ea1f3881434c7aabad6c9ff4827cc595afb326d978de9dbf0cfd1f80d96f9d242e11da8025970f1cf594382f01b1c86e53476d5e7896ed802dd9c018d6dc0

  • SSDEEP

    12288:yJ8TOT7hr3MBm3CCkf3HHhBjM14MqLNyjK3h//8wr+kv:yEU7hDMg3bkf3nbjZR//8kT

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://harmfullyelobardek.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe
    "C:\Users\Admin\AppData\Local\Temp\6ea5dc63bda788cd58bcbc5d9c736f7ba1d01371a9d05c53134616c2776c6314.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4612
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:2368
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
            PID:3768
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 336
            2⤵
            • Program crash
            PID:4940

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1468-0-0x0000000000AB0000-0x0000000000AB1000-memory.dmp
          Filesize

          4KB

        • memory/3768-1-0x0000000000400000-0x000000000045A000-memory.dmp
          Filesize

          360KB

        • memory/3768-3-0x0000000000400000-0x000000000045A000-memory.dmp
          Filesize

          360KB

        • memory/3768-4-0x0000000000400000-0x000000000045A000-memory.dmp
          Filesize

          360KB