File name:

#Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@(1).zip

Full analysis: https://app.any.run/tasks/9b2477b1-5cf4-4fc4-851a-12bc5ec430d1
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: December 25, 2024, 15:12:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

CFF148AB203C04841FDF074A9759C4C2

SHA1:

7890810E6CCFF3911852AA549F3BBAF7AC15236C

SHA256:

5027593D821A39CBB5BBB22318DD7C5863068721B9F67BCB6A132304138C3FFC

SSDEEP:

98304:jR018apx25zljdkSJ9vSQDe8T6oZWZ75TrhcMI/sTAx6Elx+ynS6H94kVlkidbM4:g4Wwl6cf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • Setup.exe (PID: 6908)
    • LUMMA mutex has been found

      • Setup.exe (PID: 6908)
    • Actions looks like stealing of personal data

      • Setup.exe (PID: 6908)
    • Executing a file with an untrusted certificate

      • Setup.exe (PID: 6908)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5736)
      • WinRAR.exe (PID: 6468)
    • Application launched itself

      • WinRAR.exe (PID: 5736)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6468)
    • Generic archive extractor

      • WinRAR.exe (PID: 5736)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 6468)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 5736)
      • WinRAR.exe (PID: 6468)
    • Reads the software policy settings

      • Setup.exe (PID: 6908)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6468)
    • Checks supported languages

      • Setup.exe (PID: 6908)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6468)
    • Reads the computer name

      • Setup.exe (PID: 6908)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: 0x0800
ZipCompression: None
ZipModifyDate: 2024:12:24 16:36:00
ZipCRC: 0x9af6f637
ZipCompressedSize: 4889281
ZipUncompressedSize: 4889281
ZipFileName: #Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@.7z
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe #LUMMA setup.exe

Process information

PID
CMD
Path
Indicators
Parent process
5736"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\#Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@(1).zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6468"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa5736.37216\#Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@.7zC:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6908"C:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Setup.exe
WinRAR.exe
User:
admin
Company:
Bitvise Limited
Integrity Level:
MEDIUM
Description:
Bitvise SSH Client scriptable command line remote program execution client
Version:
9.42.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb6468.37765\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
Total events
4 086
Read events
4 069
Write events
17
Delete events
0

Modification events

(PID) Process:(5736) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5736) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5736) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5736) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\#Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@(1).zip
(PID) Process:(5736) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5736) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5736) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5736) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6468) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6468) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
Executable files
12
Suspicious files
2
Text files
43
Unknown types
0

Dropped files

PID
Process
Filename
Type
5736WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa5736.37216\#Pa$Sw0rD__5676-0peɴ_Set-Uᴘ@.7z
MD5:
SHA256:
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\DisplayLanguageNames.fa.txttext
MD5:59A00623B4B640EFCFBB205563B2A27A
SHA256:977CE09D594A79582B30B71DCF558E1CF3C5CE28C8813E3D2A1B524D6F76B7DF
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\mod_replace_import.txttext
MD5:75167CD6A35994124A0E4F1CB24F02E4
SHA256:C9458651F018744E56046D1EB053CFA2A22F223AB9764B163DBF247A934387BD
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\ga.txttext
MD5:B4295E254B9DFC90E0093188257C007C
SHA256:406669ECBDF562E773B9CDF831CF5F63C3DD1A012C3521A41227C9141511D959
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\TableTextServiceTigrinya.txttext
MD5:DC6BF1DA6E816AD81F1122C36C238D55
SHA256:001DAB88641E043BE046351DAB1C3BE9FECCC5CF1A531B52D7F2D24B4F44C684
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\rsc.io_quote_v1.2.0.txttext
MD5:E5C9B0AB281A492CCA9035CB323813A0
SHA256:AB2EA89667510C69172EDBC6DA218947C43B9CB271FEC8F7224453D5D579A71D
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\tags.txttext
MD5:24748C75C8D7C24613E0D19F9612B58B
SHA256:447BB964D3975B04DC1693B5562D78C3BA8A2F6510302362A038C7E5C14ABC80
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\mod_list.txttext
MD5:A651545EBAC407934B9C4CC1EE5D62D8
SHA256:D3FDE0FC938D802398B694F84F6AE5EA340C37D6889C14B5BBDBC84C79419020
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\DisplayLanguageNames.uk.txttext
MD5:524C44CB3B0E0F4C9B402D27C4042B8C
SHA256:55C9F811369A94794266ABE3CA4078732F506463D0E6FA115C6CF7FF6898B798
6468WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6468.37765\Config\DisplayLanguageNames.ja_JP.txttext
MD5:468293226B9E51736BE5FD18A7A428E5
SHA256:A3E756356ACA1A07A49B90B6B546D6C56AB8D7B1D1595C70F00A0DA2AA5CBC01
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
37
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4308
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6312
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4308
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4804
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4804
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4308
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4308
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.209.158:443
www.bing.com
Akamai International B.V.
GB
unknown
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.bing.com
  • 2.23.209.158
  • 2.23.209.181
  • 2.23.209.176
  • 2.23.209.177
  • 2.23.209.149
  • 2.23.209.179
  • 2.23.209.182
  • 2.23.209.150
  • 2.23.209.161
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.71
  • 40.126.31.73
  • 20.190.159.0
  • 20.190.159.68
  • 20.190.159.4
  • 20.190.159.71
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.103.156.88
unknown

Threats

No threats detected
No debug info