File name:

#Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@(1).zip

Full analysis: https://app.any.run/tasks/9b2477b1-5cf4-4fc4-851a-12bc5ec430d1
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: December 25, 2024, 15:12:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

CFF148AB203C04841FDF074A9759C4C2

SHA1:

7890810E6CCFF3911852AA549F3BBAF7AC15236C

SHA256:

5027593D821A39CBB5BBB22318DD7C5863068721B9F67BCB6A132304138C3FFC

SSDEEP:

98304:jR018apx25zljdkSJ9vSQDe8T6oZWZ75TrhcMI/sTAx6Elx+ynS6H94kVlkidbM4:g4Wwl6cf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Setup.exe (PID: 6908)
    • LUMMA mutex has been found

      • Setup.exe (PID: 6908)
    • Steals credentials from Web Browsers

      • Setup.exe (PID: 6908)
    • Actions looks like stealing of personal data

      • Setup.exe (PID: 6908)
  • SUSPICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5736)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5736)
      • WinRAR.exe (PID: 6468)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6468)
    • Application launched itself

      • WinRAR.exe (PID: 5736)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 6468)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 6468)
      • WinRAR.exe (PID: 5736)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6468)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6468)
    • Reads the computer name

      • Setup.exe (PID: 6908)
    • Reads the software policy settings

      • Setup.exe (PID: 6908)
    • Checks supported languages

      • Setup.exe (PID: 6908)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: 0x0800
ZipCompression: None
ZipModifyDate: 2024:12:24 16:36:00
ZipCRC: 0x9af6f637
ZipCompressedSize: 4889281
ZipUncompressedSize: 4889281
ZipFileName: #Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@.7z
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe #LUMMA setup.exe

Process information

PID
CMD
Path
Indicators
Parent process
5736"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\#Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@(1).zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
6468"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa5736.37216\#Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@.7zC:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
6908"C:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Setup.exe
WinRAR.exe
User:
admin
Company:
Bitvise Limited
Integrity Level:
MEDIUM
Description:
Bitvise SSH Client scriptable command line remote program execution client
Version:
9.42.0.0
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
12
Suspicious files
2
Text files
43
Unknown types
0

Dropped files

PID
Process
Filename
Type
5736WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa5736.37216\#Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@.7z
MD5:
SHA256:
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\jvm.hprof.txttext
MD5:C677FF69E70DC36A67C72A3D7EF84D28
SHA256:B055BF25B07E5AC70E99B897FB8152F288769065B5B84387362BB9CC2E6C9D38
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\build_no_go.txttext
MD5:4423738EA11C32298E0DF0E160DFCB6F
SHA256:99C037FEA2E972065B6ADD7BAE526491B91F41A765257876A09D0FA3F075D1CA
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\fold.txttext
MD5:EC70D9AC95E4D0C8ECFC859D46E2EB3C
SHA256:16F84C45C630CE3071A164AA46FD2DC09B2F9CCD992072C8660FC2F737F8780F
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\rsc.io_quote_v1.2.0.txttext
MD5:E5C9B0AB281A492CCA9035CB323813A0
SHA256:AB2EA89667510C69172EDBC6DA218947C43B9CB271FEC8F7224453D5D579A71D
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\mod_test_files.txttext
MD5:85E210F2A362F270D46EB0D9A83BC9C9
SHA256:2ADC1A5401A6156C34F92D0BA5899400253DBDBF81CC32925A647A60255A673B
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\test_json_panic_exit.txttext
MD5:BA294836BE43377D2714DD4F0D7FFE5E
SHA256:436296DF48084B3BAF13087D6A92C61B7C39A13E4BC62F48AD151687AD3F5CBD
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\Swedish.txttext
MD5:C07810393930EDFBBBDBCA8A0F3A6B20
SHA256:5AC4E6D56CE6B6A82A59610AA4AE174A1B4D638D605423CD4DACCB4501868AB2
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\TableTextServiceTigrinya.txttext
MD5:DC6BF1DA6E816AD81F1122C36C238D55
SHA256:001DAB88641E043BE046351DAB1C3BE9FECCC5CF1A531B52D7F2D24B4F44C684
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\work_regression_hang.txttext
MD5:779DFFCA3104ECACFE8B27A0FBFF58D0
SHA256:584DFBC243A09C160E612694B98690F0E6F61EB3430FCBC11322F2B1C0C7B145
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
37
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4308
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4308
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6312
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4804
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4804
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4308
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4308
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.209.158:443
www.bing.com
Akamai International B.V.
GB
unknown
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.bing.com
  • 2.23.209.158
  • 2.23.209.181
  • 2.23.209.176
  • 2.23.209.177
  • 2.23.209.149
  • 2.23.209.179
  • 2.23.209.182
  • 2.23.209.150
  • 2.23.209.161
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.71
  • 40.126.31.73
  • 20.190.159.0
  • 20.190.159.68
  • 20.190.159.4
  • 20.190.159.71
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.103.156.88
unknown

Threats

No threats detected
No debug info