| File name: | Set-up.exe |
| Full analysis: | https://app.any.run/tasks/b1a9a346-af9e-4a17-b10f-462e67d88fb6 |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | January 05, 2025, 10:30:23 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 8139ECD1163D5FCC41821DBB61DDC2FF |
| SHA1: | 707F18CC33E9BA8F7ADA11B202B44876D375CECF |
| SHA256: | 4DBF3891EF5BB0E734B67630FE2B5210035D56307AD663F3867D9EBCDD00497A |
| SSDEEP: | 98304:kv9ZEG/HONbSxhCi+EdltEWmDfLOc8GQo6+NIVmC9EVJh:R |
| .exe | | | Win64 Executable (generic) (76.4) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2011:09:26 13:21:28+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 28160 |
| InitializedDataSize: | 480768 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x3883 |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3696 | choice /d y /t 5 | C:\Windows\SysWOW64\choice.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Offers the user a choice Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5404 | Establish.com u | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\446130\Establish.com | cmd.exe | ||||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script (Beta) Exit code: 0 Version: 3, 3, 15, 5 Modules
| |||||||||||||||
| 6232 | cmd /c copy /b 446130\Establish.com + Jon + Suggestion + Career + Biz + Build + Getting + Diving + Generation + Crossword + Betting + Lender 446130\Establish.com | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6292 | cmd /c copy /b ..\Teen + ..\Alabama + ..\Important + ..\Drawings + ..\Den + ..\Sluts + ..\Names u | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6804 | "C:\Users\admin\Desktop\Set-up.exe" | C:\Users\admin\Desktop\Set-up.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 6848 | "C:\Windows\System32\cmd.exe" /c move Manor Manor.cmd & Manor.cmd | C:\Windows\SysWOW64\cmd.exe | — | Set-up.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6864 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6940 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6948 | findstr /I "opssvc wrsa" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6804 | Set-up.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Relations | compressed | |
MD5:5E0DE4F2FD4D38EE81A15AC14CE2C969 | SHA256:7A2A356B7F46E4F37999DD9CE3ECFA7A66CE7DDA4FB5A61CFB7DC840489B7FC4 | |||
| 6804 | Set-up.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Names | binary | |
MD5:57B6A485627BAECFA5DCFB502302F5A1 | SHA256:B136E3405BFFB3F933D9D0D2E58D60D7C0F3C9C524ED7BC35AB5E062E507113D | |||
| 6848 | cmd.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Manor.cmd | text | |
MD5:D56C18404768483C2484A502B0DA5FC4 | SHA256:B820146A0717C92007A6C5CDE0FBED169576E1E31D3BA5BB456ED04FF9F0E9D3 | |||
| 6804 | Set-up.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Important | binary | |
MD5:ADACC2F80343487D73B16F8123C54B7D | SHA256:B08BBEA7033A56F42B720CCFE7998E9420BC9561F5069AFE30CA8AAAAC908A7B | |||
| 7128 | extrac32.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Build | binary | |
MD5:C48C0679685C473A47C3891E4D02B9B2 | SHA256:CA8FB1C7CAF38D7483697762BECAC0C29AF09F2D2705366FBC941C30D53B7262 | |||
| 7128 | extrac32.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Suggestion | binary | |
MD5:8962D624F9206BC21E436E50875BAA4F | SHA256:59393AF256C1C55406511C5885B1523681FB035188C6CFCBEA4FD84C3747FA67 | |||
| 6804 | Set-up.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Sluts | binary | |
MD5:28D8ADD8D0A4C5DF5C6A4B44DDE54D38 | SHA256:5F7F9CF7166F9332D99893BDF51FF2E89EB882859ED4A61431753629DB9219E7 | |||
| 6804 | Set-up.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Manor | text | |
MD5:D56C18404768483C2484A502B0DA5FC4 | SHA256:B820146A0717C92007A6C5CDE0FBED169576E1E31D3BA5BB456ED04FF9F0E9D3 | |||
| 6804 | Set-up.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Drawings | binary | |
MD5:6653A3FACEB89300BE8C6678416E1756 | SHA256:C4B45B1CAF5665F279B4B23223BFB9248788C254FEB22A80553D2E141E068A51 | |||
| 7128 | extrac32.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Career | binary | |
MD5:4C97B36B018276C1CFEA2CAF84412819 | SHA256:37281A1856B71C3AE5AD48CDF5F069C2A37017578925097B52C9C8AE316574D3 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
440 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.212.216.106:443 | https://steamcommunity.com/profiles/76561199724331900 | unknown | html | 34.3 Kb | whitelisted |
— | — | POST | 200 | 172.67.160.114:443 | https://wholersorie.shop/api | unknown | text | 17 b | malicious |
— | — | POST | 200 | 104.21.71.146:443 | https://noisycuttej.shop/api | unknown | text | 17 b | malicious |
— | — | POST | 200 | 172.67.179.160:443 | https://framekgirus.shop/api | unknown | text | 17 b | malicious |
— | — | POST | 200 | 104.21.112.1:443 | https://tirepublicerj.shop/api | unknown | text | 17 b | malicious |
— | — | POST | 200 | 188.114.97.3:443 | https://deletteproposez.click/api | unknown | text | 17 b | — |
— | — | POST | 200 | 104.21.48.1:443 | https://cloudewahsj.shop/api | unknown | text | 17 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 2.23.227.208:443 | www.bing.com | Ooredoo Q.S.C. | QA | whitelisted |
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.48.23.137:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
440 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5404 | Establish.com | 188.114.97.3:443 | deletteproposez.click | CLOUDFLARENET | NL | unknown |
5404 | Establish.com | 104.21.112.1:443 | abruptyopsn.shop | CLOUDFLARENET | — | malicious |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fJLEZdwdvmkbhApFpKCL.fJLEZdwdvmkbhApFpKCL |
| unknown |
deletteproposez.click |
| unknown |
nearycrepso.shop |
| malicious |
abruptyopsn.shop |
| malicious |
wholersorie.shop |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (abruptyopsn .shop) |
2192 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nearycrepso .shop) |
5404 | Establish.com | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) |
5404 | Establish.com | A Network Trojan was detected | STEALER [ANY.RUN] Lumma Stealer TLS Connection |
2192 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wholersorie .shop) |
5404 | Establish.com | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (wholersorie .shop in TLS SNI) |
5404 | Establish.com | A Network Trojan was detected | STEALER [ANY.RUN] Lumma Stealer TLS Connection |
2192 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (framekgirus .shop) |
5404 | Establish.com | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (framekgirus .shop in TLS SNI) |
5404 | Establish.com | A Network Trojan was detected | STEALER [ANY.RUN] Lumma Stealer TLS Connection |