| File name: | [Canon]Private Library.exe |
| Full analysis: | https://app.any.run/tasks/daedc70d-258e-47d8-8f6b-5d297528b285 |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | July 08, 2024, 16:48:16 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5: | 1960F234B37117D3054663D94A09A0FC |
| SHA1: | CE8A6281D12C7DA66EC31EF9F6D23D3FFCD66AEE |
| SHA256: | 3746A1BC705C29158C184B7740DBC01791B65787728BA1DCA1561554064AF6FD |
| SSDEEP: | 24576:I1ZVwBZmhm47CPOuStPAlIpv4CLtgHNCdTKGAxwk:I1ZVwBZmhm47CPOuSjtgHNCdTKjxwk |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:07:07 10:12:53+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.29 |
| CodeSize: | 887808 |
| InitializedDataSize: | 1715200 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x68a58 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2008 | "C:\Users\admin\Downloads\[Canon]Private Library.exe" | C:\Users\admin\Downloads\[Canon]Private Library.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 1 Modules
| |||||||||||||||
| 5396 | "C:\Users\admin\AppData\Local\Temp\J" | C:\Users\admin\AppData\Local\Temp\J | [Canon]Private Library.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Watson Subscriber for SENS Network Notifications Exit code: 0 Version: 11.0.8161 Modules
Lumma(PID) Process(5396) J C2 (8)answerrsdo.shop bouncedgowp.shop radiationnopp.shop benchillppwo.shop bargainnykwo.shop bannngwko.shop affecthorsedpo.shop publicitttyps.shop | |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2008 | [Canon]Private Library.exe | C:\Users\admin\AppData\Local\Temp\J | executable | |
MD5:3992F464696B0EEFF236AEF93B1FDBD5 | SHA256:0D1A8457014F2EB2563A91D1509DBA38F6C418FEDF5F241D8579D15A93E40E14 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5396 | J | 104.21.81.196:443 | bannngwko.shop | CLOUDFLARENET | — | unknown |
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
5396 | J | 188.114.96.3:443 | bouncedgowp.shop | CLOUDFLARENET | NL | unknown |
5396 | J | 104.21.6.254:443 | affecthorsedpo.shop | CLOUDFLARENET | — | unknown |
2204 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4752 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6004 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5396 | J | 188.114.97.3:443 | bouncedgowp.shop | CLOUDFLARENET | NL | unknown |
Domain | IP | Reputation |
|---|---|---|
bannngwko.shop |
| malicious |
bouncedgowp.shop |
| malicious |
bargainnykwo.shop |
| malicious |
affecthorsedpo.shop |
| malicious |
settings-win.data.microsoft.com |
| whitelisted |
radiationnopp.shop |
| malicious |
answerrsdo.shop |
| malicious |
publicitttyps.shop |
| malicious |
benchillppwo.shop |
| malicious |
steamcommunity.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2168 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (bannngwko .shop) |
5396 | J | Domain Observed Used for C2 Detected | ET MALWARE Observed Lumma Stealer Related Domain (bannngwko .shop in TLS SNI) |
2168 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (bargainnykwo .shop) |
5396 | J | Domain Observed Used for C2 Detected | ET MALWARE Observed Lumma Stealer Related Domain (bouncedgowp .shop in TLS SNI) |
2168 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (bouncedgowp .shop) |
2168 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (affecthorsedpo .shop) |
5396 | J | Domain Observed Used for C2 Detected | ET MALWARE Observed Lumma Stealer Related Domain (bannngwko .shop in TLS SNI) |
5396 | J | Domain Observed Used for C2 Detected | ET MALWARE Observed Lumma Stealer Related Domain (bargainnykwo .shop in TLS SNI) |
5396 | J | Domain Observed Used for C2 Detected | ET MALWARE Observed Lumma Stealer Related Domain (affecthorsedpo .shop in TLS SNI) |
2168 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (radiationnopp .shop) |