File name:

setup.exe

Full analysis: https://app.any.run/tasks/0444b32b-3c03-4868-ae58-08854c18eb8b
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: February 03, 2025, 19:50:19
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
delphi
lumma
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

12539C5B6EE8B70B78710014D1B40292

SHA1:

8DEFDF92C9C6D113F1622A0A526AA731EE7B6095

SHA256:

68A299ADEFD13A3A5F28909CC60C3BDAB2850514A071704379D9F3F3D4CD458F

SSDEEP:

49152:phM8qdw5RuQX0Sq7Mvanf5SBufNZdey6zjX7KEwOcrdJXmLB2dS8d3z:Jqm5vviRePvi0208t

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • setup.exe (PID: 6436)
    • LUMMA mutex has been found

      • setup.exe (PID: 6436)
    • Actions looks like stealing of personal data

      • setup.exe (PID: 6436)
    • LUMMA has been detected (YARA)

      • setup.exe (PID: 6436)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • setup.exe (PID: 6436)
      • iTunesHelper.exe (PID: 3508)
    • Process drops legitimate windows executable

      • setup.exe (PID: 6436)
      • iTunesHelper.exe (PID: 3508)
    • Executable content was dropped or overwritten

      • iTunesHelper.exe (PID: 3508)
      • setup.exe (PID: 6436)
    • Starts application with an unusual extension

      • iTunesHelper.exe (PID: 2728)
    • Starts itself from another location

      • iTunesHelper.exe (PID: 3508)
  • INFO

    • Reads the computer name

      • setup.exe (PID: 6436)
    • Reads the software policy settings

      • setup.exe (PID: 6436)
    • Compiled with Borland Delphi (YARA)

      • setup.exe (PID: 6436)
    • Creates files in the program directory

      • iTunesHelper.exe (PID: 3508)
    • Create files in a temporary directory

      • setup.exe (PID: 6436)
    • The sample compiled with english language support

      • iTunesHelper.exe (PID: 3508)
      • setup.exe (PID: 6436)
    • Checks supported languages

      • more.com (PID: 1616)
      • setup.exe (PID: 6436)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (79.7)
.exe | Win32 Executable (generic) (8.6)
.exe | Win16/32 Executable Delphi generic (3.9)
.exe | Generic Win/DOS Executable (3.8)
.exe | DOS Executable Generic (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:08:26 16:40:41+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 1023488
InitializedDataSize: 351232
UninitializedDataSize: -
EntryPoint: 0xfadb8
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 2.1.0.0
ProductVersionNumber: 2.1.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: OmicronLab
FileDescription: Skin Designer for Avro Keyboard
FileVersion: 2.1.0.0
InternalName: Skin Designer.exe
LegalCopyright: © OmicronLab. All rights reserved.
LegalTrademarks: Skin Designer
OriginalFileName: Skin Designer.exe
ProductName: Skin Designer
ProductVersion: 2.1.0.0
Comments: Skin Designer for Avro Keyboard
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #LUMMA setup.exe svchost.exe ituneshelper.exe ituneshelper.exe no specs more.com no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
836\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1616C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.comiTunesHelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2728C:\ProgramData\MsiSleuth\iTunesHelper.exeC:\ProgramData\MsiSleuth\iTunesHelper.exeiTunesHelper.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
MEDIUM
Description:
iTunesHelper
Version:
12.12.9.4
Modules
Images
c:\programdata\msisleuth\ituneshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
3508"C:\Users\admin\AppData\Local\Temp\ZGH5PLRHCFG9NUROMUBG6O5Y72K4QEV\iTunesHelper.exe"C:\Users\admin\AppData\Local\Temp\ZGH5PLRHCFG9NUROMUBG6O5Y72K4QEV\iTunesHelper.exe
setup.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
MEDIUM
Description:
iTunesHelper
Exit code:
0
Version:
12.12.9.4
Modules
Images
c:\users\admin\appdata\local\temp\zgh5plrhcfg9nuromubg6o5y72k4qev\ituneshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
6436"C:\Users\admin\AppData\Local\Temp\setup.exe" C:\Users\admin\AppData\Local\Temp\setup.exe
explorer.exe
User:
admin
Company:
OmicronLab
Integrity Level:
MEDIUM
Description:
Skin Designer for Avro Keyboard
Exit code:
0
Version:
2.1.0.0
Modules
Images
c:\users\admin\appdata\local\temp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
Total events
619
Read events
619
Write events
0
Delete events
0

Modification events

No data
Executable files
20
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6436setup.exeC:\Users\admin\AppData\Local\Temp\ZGH5PLRHCFG9NUROMUBG6O5Y72K4QEV\protozoa.m4a
MD5:
SHA256:
6436setup.exeC:\Users\admin\AppData\Local\Temp\ZGH5PLRHCFG9NUROMUBG6O5Y72K4QEV\CoreFoundation.dll
MD5:
SHA256:
3508iTunesHelper.exeC:\ProgramData\MsiSleuth\CoreFoundation.dll
MD5:
SHA256:
6436setup.exeC:\Users\admin\AppData\Local\Temp\ZGH5PLRHCFG9NUROMUBG6O5Y72K4QEV\ASL.dllexecutable
MD5:8E99111C8F13D5CCE197E329057420A3
SHA256:52659DE729FD277E9CDBDF3AD3F7663C8199FDB5D79E07211F6B77CA2F392BD1
6436setup.exeC:\Users\admin\AppData\Local\Temp\ZGH5PLRHCFG9NUROMUBG6O5Y72K4QEV\msvcp140.dllexecutable
MD5:1BA6D1CF0508775096F9E121A24E5863
SHA256:74892D9B4028C05DEBAF0B9B5D9DC6D22F7956FA7D7EEE00C681318C26792823
6436setup.exeC:\Users\admin\AppData\Local\Temp\ZGH5PLRHCFG9NUROMUBG6O5Y72K4QEV\objc.dllexecutable
MD5:A55EC6E25D4F6D954A9FB52688A847E9
SHA256:ED49012C1AFB709DE4775E570E8DF4BC2F11017E9F71C2F2FD243AE8A8174EAA
3508iTunesHelper.exeC:\ProgramData\MsiSleuth\protozoa.m4a
MD5:
SHA256:
6436setup.exeC:\Users\admin\AppData\Local\Temp\ZGH5PLRHCFG9NUROMUBG6O5Y72K4QEV\signore.mkvbinary
MD5:904A594A59455B6F2D989FB74AAF50E1
SHA256:B7D814A774BE4BACE56B4518C88360C87CBC73F807FC43BFB7474ABCD16CE4F0
6436setup.exeC:\Users\admin\AppData\Local\Temp\ZGH5PLRHCFG9NUROMUBG6O5Y72K4QEV\libdispatch.dllexecutable
MD5:21EE735CC24421C28E7C4F5D6CD1F353
SHA256:0F194EB78BB3217547C7F5506F7B34D259B752E3529976AB6907E3F3E3B97DA7
3508iTunesHelper.exeC:\ProgramData\MsiSleuth\ASL.dllexecutable
MD5:8E99111C8F13D5CCE197E329057420A3
SHA256:52659DE729FD277E9CDBDF3AD3F7663C8199FDB5D79E07211F6B77CA2F392BD1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
35
DNS requests
20
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
95.101.78.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4804
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4804
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
95.101.78.42:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3700
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3700
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6436
setup.exe
104.21.80.1:443
culinarydelighytts.top
CLOUDFLARENET
unknown
1176
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
ocsp.digicert.com
  • 184.30.131.245
whitelisted
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 95.101.78.42
  • 95.101.78.32
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 40.127.240.158
whitelisted
culinarydelighytts.top
  • 104.21.80.1
  • 104.21.64.1
  • 104.21.48.1
  • 104.21.112.1
  • 104.21.96.1
  • 104.21.32.1
  • 104.21.16.1
unknown
login.live.com
  • 20.190.160.20
  • 40.126.32.76
  • 20.190.160.5
  • 20.190.160.64
  • 20.190.160.17
  • 40.126.32.68
  • 40.126.32.72
  • 20.190.160.65
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
cegu.shop
unknown
u2.servicelandingkaraoke.shop
  • 188.114.97.3
  • 188.114.96.3
malicious

Threats

PID
Process
Class
Message
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
2192
svchost.exe
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Suspected Malicious domain by CrossDomain ( .servicelandingkaraoke .shop)
No debug info