File name:

alex12312312321.exe

Full analysis: https://app.any.run/tasks/6e054608-b928-40bf-9aef-2015a1c5be7a
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: February 08, 2025, 16:07:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
netreactor
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 4 sections
MD5:

4AA99FAD3331371B00EACA12EB716D40

SHA1:

A4547FA827BCD8B3B3466C9DB78E62158E2C1C66

SHA256:

0D57BF1E36617D58510102354F24AE5D4559F31B656E2527509DEF4D4AF65469

SSDEEP:

24576:gA4WGKKnc5tvvka1Lx4YFQY/OFfF8zRwXvtA4YEq8sWbT:SBKKncXvP1Lx4YFr/OFfF8zRwXvtA4YA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • alex12312312321.exe (PID: 6412)
    • Steals credentials from Web Browsers

      • alex12312312321.exe (PID: 6592)
    • Actions looks like stealing of personal data

      • alex12312312321.exe (PID: 6592)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2192)
    • Connects to the CnC server

      • svchost.exe (PID: 2192)
    • LUMMA mutex has been found

      • alex12312312321.exe (PID: 6592)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2192)
    • Application launched itself

      • alex12312312321.exe (PID: 6412)
    • Executes application which crashes

      • alex12312312321.exe (PID: 6412)
    • Searches for installed software

      • alex12312312321.exe (PID: 6592)
  • INFO

    • Reads the computer name

      • alex12312312321.exe (PID: 6592)
      • alex12312312321.exe (PID: 6412)
    • Checks supported languages

      • alex12312312321.exe (PID: 6592)
      • alex12312312321.exe (PID: 6412)
    • Reads the software policy settings

      • alex12312312321.exe (PID: 6592)
      • WerFault.exe (PID: 6744)
    • .NET Reactor protector has been detected

      • alex12312312321.exe (PID: 6412)
    • Checks proxy server information

      • WerFault.exe (PID: 6744)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (61.6)
.dll | Win32 Dynamic Link Library (generic) (14.6)
.exe | Win32 Executable (generic) (10)
.exe | Win16/32 Executable Delphi generic (4.6)
.exe | Generic Win/DOS Executable (4.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2101:01:10 00:47:06+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 224256
InitializedDataSize: 1536
UninitializedDataSize: -
EntryPoint: 0x38abe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start alex12312312321.exe #LUMMA alex12312312321.exe werfault.exe #LUMMA svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6412"C:\Users\admin\AppData\Local\Temp\alex12312312321.exe" C:\Users\admin\AppData\Local\Temp\alex12312312321.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226505
Modules
Images
c:\users\admin\appdata\local\temp\alex12312312321.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6592"C:\Users\admin\AppData\Local\Temp\alex12312312321.exe"C:\Users\admin\AppData\Local\Temp\alex12312312321.exe
alex12312312321.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\alex12312312321.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
6744C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6412 -s 828C:\Windows\SysWOW64\WerFault.exe
alex12312312321.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 691
Read events
3 691
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
6
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6744WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_alex12312312321._47ed9a473293dbf14ff3c8a9f940889020a8cb33_99d4bee5_46daa4c4-004d-44cc-a893-58b1f6f0b401\Report.wer
MD5:
SHA256:
6744WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\alex12312312321.exe.6412.dmp
MD5:
SHA256:
6744WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5D94.tmp.dmpbinary
MD5:443984D0A21D96C1419DC9445C9D581F
SHA256:C1842EB26B4DE99319FC6888E882D7A947239A97A04622476B633DFA29B7341B
6744WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5EBE.tmp.WERInternalMetadata.xmlbinary
MD5:134F0429205418174A70583F2C77DCAC
SHA256:516C574F9F9DA33B6E7A00675CE13CCE2BE59847B16FF6A872C746E26F69FAF9
6744WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6744WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:A6490785667888130BF81A3FD735B6A5
SHA256:8F2081757FE894EE8187C2E4E259A8A99B6F9EE17746D37F37E2EFD76DFCCF21
6744WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:680B0331A3CC8FCCE16367586EC7A721
SHA256:19F1B5D2C7F62663C14D97578411DC610E5F33E6CE4165977314442435F15305
6744WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:2567173FFCA5295D9B706CA4A8CC8EBF
SHA256:0B2C098BAC22553403762E438AC6F21B914A8874D3AF95947C9552EDCAC0602A
6744WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5EFE.tmp.xmlxml
MD5:561EFD4584ED95C01A0F3A85B736814A
SHA256:AF27D068B2A529F3FBD98C63AA0B556A955EFF296B49D2250FCAA0E4B3F04FEC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
37
DNS requests
27
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6744
WerFault.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3188
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3188
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6516
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6744
WerFault.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5064
SearchApp.exe
2.21.65.132:443
Akamai International B.V.
NL
unknown
4
System
192.168.100.255:137
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6592
alex12312312321.exe
104.102.49.254:443
steamcommunity.com
AKAMAI-AS
DE
whitelisted
6592
alex12312312321.exe
104.21.61.41:443
hopeefreamed.com
CLOUDFLARENET
malicious
1176
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
ocsp.digicert.com
  • 184.30.131.245
whitelisted
azurgewhisper.hair
malicious
clammypunero.com
malicious
toppyneedus.biz
malicious
skirtgrippys.com
malicious
plasticreie.com
malicious
cabbagepattof.net
malicious
believezioep.com
malicious
shunstriderk.net
malicious
garderjjerop.com
malicious

Threats

PID
Process
Class
Message
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (azurgewhisper .hair)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (clammypunero .com)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shunstriderk .net)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (toppyneedus .biz)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (garderjjerop .com)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cabbagepattof .net)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (believezioep .com)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (skirtgrippys .com)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (plasticreie .com)
No debug info