Analysis

  • max time kernel
    131s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 13:16

General

  • Target

    Setup.exe

  • Size

    5.8MB

  • MD5

    c34e8f27e5e41acc13f476298be901f5

  • SHA1

    1857dfcf2bbb4e91fed3595395cc6ea1b6e5e425

  • SHA256

    8c09b0520cd0a587ccdab5f16b202ef013d9bf3b4fc7653b5afdf480417d33f1

  • SHA512

    ccc416d96d36b792c59bdfd23c5e2e3b2c08c3498e43af7e0e5b873e0828c23fb30c1f21428fb8f984df99255d232e718422ce95acc8bba888da082f465c6709

  • SSDEEP

    98304:vsMDHDRm8rcgEqQQ5izvWtb2ZaQ9kclxrg/bYzO6TEYJYEHjHO:RHDRLrcgEq55izvWtDaxbBOLYJYmu

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://prettilikeopwp.shop/api

https://potterryisiw.shop/api

https://foodypannyjsud.shop/api

https://contintnetksows.shop/api

https://reinforcedirectorywd.shop/api

Signatures

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Windows\SysWOW64\more.com
      C:\Windows\SysWOW64\more.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\SearchIndexer.exe
        C:\Windows\SysWOW64\SearchIndexer.exe
        3⤵
          PID:4380
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4280,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=2860 /prefetch:8
      1⤵
        PID:844

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7748f7d0
        Filesize

        1.2MB

        MD5

        d85456bc93bc20de97041fb8f7f79247

        SHA1

        d155e82d273925a86ef370c9f3fda0a0cb1112ef

        SHA256

        9046bbd0bcb00410590ff77db0766c8c26f26afa4eb6431b4fb7d5e5aa8d00bf

        SHA512

        c6ca930fe9f95058c05ec1c2852645c4c2c967e9423bb058633503541e09bd59bdd42b8eb4a1c11892adf73e2774ce11e90303b01f1f31798d56e5ae23f9de7c

      • C:\Users\Admin\AppData\Local\Temp\7a98c61b
        Filesize

        1016KB

        MD5

        bc259af6a074f0dc1421a82983cba7dc

        SHA1

        b3dd3b558fa68857f86a44134fb8048dd80a80fc

        SHA256

        dca6a4e962eec78c1b7c14a30b6b2730773a0c669681e56df7b6abff60a778cf

        SHA512

        2cd434b4bc20de8fc1fd00c1c7a9834e7a975f45d68d2bef0538047691b9c2f3cba590cd1e5e69b50b9e6ca8ce6e882efb058c069b8baa91e6badd0e3938f616

      • memory/2260-18-0x0000000074560000-0x00000000745B2000-memory.dmp
        Filesize

        328KB

      • memory/2260-12-0x0000000074560000-0x00000000745B2000-memory.dmp
        Filesize

        328KB

      • memory/2260-16-0x0000000074560000-0x00000000745B2000-memory.dmp
        Filesize

        328KB

      • memory/2260-15-0x0000000074560000-0x00000000745B2000-memory.dmp
        Filesize

        328KB

      • memory/2260-14-0x00007FFF1EE30000-0x00007FFF1F025000-memory.dmp
        Filesize

        2.0MB

      • memory/4276-10-0x0000000074560000-0x00000000745B2000-memory.dmp
        Filesize

        328KB

      • memory/4276-6-0x0000000074560000-0x00000000745B2000-memory.dmp
        Filesize

        328KB

      • memory/4276-7-0x00007FFF1EE30000-0x00007FFF1F025000-memory.dmp
        Filesize

        2.0MB

      • memory/4276-8-0x0000000074572000-0x0000000074574000-memory.dmp
        Filesize

        8KB

      • memory/4276-9-0x0000000074560000-0x00000000745B2000-memory.dmp
        Filesize

        328KB

      • memory/4276-0-0x0000000000480000-0x0000000000A5B000-memory.dmp
        Filesize

        5.9MB

      • memory/4380-19-0x00007FFF1EE30000-0x00007FFF1F025000-memory.dmp
        Filesize

        2.0MB

      • memory/4380-20-0x0000000000AE0000-0x0000000000B3A000-memory.dmp
        Filesize

        360KB

      • memory/4380-21-0x0000000000AE0000-0x0000000000B3A000-memory.dmp
        Filesize

        360KB

      • memory/4380-22-0x0000000000D1B000-0x0000000000D22000-memory.dmp
        Filesize

        28KB