Resubmissions

01-07-2024 19:00

240701-xnp9zstfnc 5

01-07-2024 18:54

240701-xkj9kaxflj 4

01-07-2024 18:53

240701-xjrbgstdrf 10

01-07-2024 18:44

240701-xdytdatbqe 7

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 18:53

General

  • Target

    JudgeLZT.exe

  • Size

    951KB

  • MD5

    18f16ea3096e479cc7923df5269b25d8

  • SHA1

    c0169fdb70ca980a8ca0baebb2fc3a118fd290c6

  • SHA256

    1c84f3a2fd0a00690b2a2e385d952ec3f7a7c94223fd0e3a80aff510d329d13c

  • SHA512

    5a38cf66a137a51776335f520f8b6a39db025a426b0669088f813979fabfe279c38c19504db233153865c6d0f2f759c61af751465245454498ef006a85a04d36

  • SSDEEP

    24576:vuZIdQCtwQpFZWRmqU573CYz6VJyH+np1Vu1OxkCTK:HwQpFZWRh/A6VJyH+zVueTK

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://groundsmooors.shop/api

https://potterryisiw.shop/api

https://foodypannyjsud.shop/api

https://contintnetksows.shop/api

https://reinforcedirectorywd.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JudgeLZT.exe
    "C:\Users\Admin\AppData\Local\Temp\JudgeLZT.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:1456
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 280
        2⤵
        • Program crash
        PID:2840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4108 -ip 4108
      1⤵
        PID:2912

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1456-0-0x0000000000400000-0x000000000045A000-memory.dmp
        Filesize

        360KB

      • memory/1456-3-0x0000000000400000-0x000000000045A000-memory.dmp
        Filesize

        360KB

      • memory/1456-4-0x0000000000400000-0x000000000045A000-memory.dmp
        Filesize

        360KB

      • memory/1456-5-0x0000000000400000-0x000000000045A000-memory.dmp
        Filesize

        360KB

      • memory/4108-1-0x0000000001570000-0x0000000001571000-memory.dmp
        Filesize

        4KB