| File name: | 18c8065794300cd166a196efd102fd9d05b1beaeaf3d65f249d8d670ac10c541.exe |
| Full analysis: | https://app.any.run/tasks/0c634979-15b2-42e1-8f96-d2e889267932 |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | January 26, 2025, 15:16:41 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 9FD74D2ABBA10DDD2F4C525749FCD84F |
| SHA1: | 3F48F29BC8FF8B334DCA5E8ABAC0B47613CF9904 |
| SHA256: | 18C8065794300CD166A196EFD102FD9D05B1BEAEAF3D65F249D8D670AC10C541 |
| SSDEEP: | 49152:P9w2T5NaWRCDN/aG2VcFRJf3UEDnh5APISKrJwUHAyILtHCn93MZbY49c2QheeLD:PqENa3D9aGaOeEDIlKCuAbC9ebYyUeeH |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2011:09:26 13:21:38+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 29696 |
| InitializedDataSize: | 489984 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x38af |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1296 | findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1468 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1480 | "C:\Windows\System32\cmd.exe" /c copy Estate Estate.cmd & Estate.cmd | C:\Windows\SysWOW64\cmd.exe | — | 18c8065794300cd166a196efd102fd9d05b1beaeaf3d65f249d8d670ac10c541.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2324 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2800 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2956 | choice /d y /t 5 | C:\Windows\SysWOW64\choice.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Offers the user a choice Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3552 | cmd /c md 473462 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3680 | findstr /I "opssvc wrsa" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5036 | findstr /V "Transit" Kirk | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6076 | 18c8065794300cd166a196efd102fd9d05b1beaeaf3d65f249d8d670ac10c541.exe | C:\Users\admin\AppData\Local\Temp\Paragraphs | binary | |
MD5:FF9050ACCCD78752D3B159D25F03AB8B | SHA256:FC616895D20BF6F3C9AA49A4F767141131770860CC8935EF4FFDD33F568B883F | |||
| 1480 | cmd.exe | C:\Users\admin\AppData\Local\Temp\Estate.cmd | text | |
MD5:C9FB74EB2912DED3889C7E1BE8348C50 | SHA256:5A9EC479D60DB60529BB293AE2744FB6CBC7DFDB5F93704ED6C35A87BB673900 | |||
| 6076 | 18c8065794300cd166a196efd102fd9d05b1beaeaf3d65f249d8d670ac10c541.exe | C:\Users\admin\AppData\Local\Temp\Shown | binary | |
MD5:76C8328D94671A268957210F3E5087B2 | SHA256:81E4FC4BFC6D9A29BC5609FD230CD7F6A29BCFFD5B6AC3572E133CCE468F02D4 | |||
| 6076 | 18c8065794300cd166a196efd102fd9d05b1beaeaf3d65f249d8d670ac10c541.exe | C:\Users\admin\AppData\Local\Temp\Estate | text | |
MD5:C9FB74EB2912DED3889C7E1BE8348C50 | SHA256:5A9EC479D60DB60529BB293AE2744FB6CBC7DFDB5F93704ED6C35A87BB673900 | |||
| 5452 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Butterfly | binary | |
MD5:67AF633BCDA822A689F0D4159FC8192A | SHA256:70E8300674ED637F96039B6A8998E1EFA860607477660C6F86D711CDF7E3C0A3 | |||
| 6076 | 18c8065794300cd166a196efd102fd9d05b1beaeaf3d65f249d8d670ac10c541.exe | C:\Users\admin\AppData\Local\Temp\Vote | compressed | |
MD5:D28DB7FD22DC2FBCE397BAFD6B6FCDB4 | SHA256:E5AF4A5D579D966D088995F47A8980C2856082D9531F3F01B4767E43C940471D | |||
| 5452 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Recipes | binary | |
MD5:63C71B6D776CECC47C9139062276E8D6 | SHA256:F0C1488318CF5BA2B32781D0D90FBA285173A64926BDAA367033459EE03026CD | |||
| 5452 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Arrivals | binary | |
MD5:B02C6A9D78A70C70C36DB6295F34D2FE | SHA256:1E18B1414BF3B90EF200953C0736652769B91A531CBB01F22A7AAD349B78E8B1 | |||
| 5452 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Shade | binary | |
MD5:E7E6D855492B77E14B7B9AF97DADCEC2 | SHA256:7B4C95B4D6A3E5643910B428621D799B1128565C1AFB89D93565877C6C134722 | |||
| 5452 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Pools | binary | |
MD5:9F82C59BEC6378BBC2E2A9DF4096EEB3 | SHA256:6977E79B088006AA1C041DCAD49D5E7D6B87A2B471DD3474ADA45AA4CDFFF96B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.180:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 104.21.63.226:443 | https://sheayingero.shop/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 104.21.63.226:443 | https://sheayingero.shop/api | unknown | text | 2 b | malicious |
— | — | POST | 200 | 172.67.172.91:443 | https://sheayingero.shop/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 172.67.172.91:443 | https://sheayingero.shop/api | unknown | text | 16.7 Kb | malicious |
— | — | POST | 200 | 104.21.63.226:443 | https://sheayingero.shop/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 104.21.63.226:443 | https://sheayingero.shop/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 172.67.172.91:443 | https://sheayingero.shop/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 172.67.172.91:443 | https://sheayingero.shop/api | unknown | text | 48 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 2.23.227.215:443 | — | Ooredoo Q.S.C. | QA | unknown |
4712 | MoUsoCoreWorker.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 2.23.227.208:443 | — | Ooredoo Q.S.C. | QA | unknown |
4712 | MoUsoCoreWorker.exe | 23.48.23.180:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
4712 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3976 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
vHsjdCmNUDDJ.vHsjdCmNUDDJ |
| unknown |
sheayingero.shop |
| malicious |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5560 | Transsexual.com | A Network Trojan was detected | STEALER [ANY.RUN] Lumma Stealer TLS Connection |