File name:

Update_131.1233.24.msi

Full analysis: https://app.any.run/tasks/b716a2b6-5e3c-412a-9aa1-b6ecc05cb22a
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: December 11, 2024, 09:24:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
lumma
stealer
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Incognito, Author: Malate Linchpin, Keywords: Installer, Comments: This installer database contains the logic and data required to install Incognito., Template: Intel;1033, Revision Number: {050CB52B-4B8C-4B43-9B6E-CED1A18596EE}, Create Time/Date: Mon Dec 9 02:29:28 2024, Last Saved Time/Date: Mon Dec 9 02:29:28 2024, Number of Pages: 500, Number of Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
MD5:

396C6C0ECAD4BBE1C61393C0ED041F57

SHA1:

3B6C7FB5A47C8B53E6CBB2A76FF95FE54791B574

SHA256:

69FA440F6F1CC7F95EFB40C5BBB2C5D197AA2CB7BC9DFA7F1E9744C86AEF7BB2

SSDEEP:

98304:dZvStqESW1TPabNpJ/lgmqZEBmYBuJDUpE6iJE6uXIxERad9Vd3iiqz+ELcDjBWU:iwEatEnt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • svchost.exe (PID: 2192)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2192)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 5004)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2092)
    • Executable content was dropped or overwritten

      • iScrPaint.exe (PID: 5540)
    • Starts itself from another location

      • iScrPaint.exe (PID: 5540)
    • Starts CMD.EXE for commands execution

      • iScrPaint.exe (PID: 5460)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2192)
  • INFO

    • Reads the computer name

      • msiexec.exe (PID: 5004)
      • iScrPaint.exe (PID: 5540)
      • iScrPaint.exe (PID: 5460)
    • The sample compiled with english language support

      • msiexec.exe (PID: 6012)
      • msiexec.exe (PID: 5004)
      • iScrPaint.exe (PID: 5540)
    • Manages system restore points

      • SrTasks.exe (PID: 648)
    • Checks supported languages

      • msiexec.exe (PID: 5004)
      • iScrPaint.exe (PID: 5540)
      • iScrPaint.exe (PID: 5460)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 5004)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 5004)
    • Creates files or folders in the user directory

      • iScrPaint.exe (PID: 5540)
    • Reads the software policy settings

      • explorer.exe (PID: 3152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: Incognito
Author: Malate Linchpin
Keywords: Installer
Comments: This installer database contains the logic and data required to install Incognito.
Template: Intel;1033
RevisionNumber: {050CB52B-4B8C-4B43-9B6E-CED1A18596EE}
CreateDate: 2024:12:09 02:29:28
ModifyDate: 2024:12:09 02:29:28
Pages: 500
Words: 10
Software: WiX Toolset (4.0.0.0)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
11
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe no specs msiexec.exe vssvc.exe no specs srtasks.exe no specs conhost.exe no specs iscrpaint.exe iscrpaint.exe no specs cmd.exe no specs conhost.exe no specs explorer.exe #LUMMA svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
648C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
716C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeiScrPaint.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2092C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3152C:\WINDOWS\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\fkupr
c:\windows\syswow64\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcp_win.dll
4500\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5004C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5460C:\Users\admin\AppData\Roaming\BeaconwriterYDGv3\iScrPaint.exeC:\Users\admin\AppData\Roaming\BeaconwriterYDGv3\iScrPaint.exeiScrPaint.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
iTop Screen Recorder
Exit code:
1
Version:
3.0.0.945
Modules
Images
c:\users\admin\appdata\roaming\beaconwriterydgv3\iscrpaint.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5540"C:\Users\admin\AppData\Local\Haji\iScrPaint.exe"C:\Users\admin\AppData\Local\Haji\iScrPaint.exe
msiexec.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
iTop Screen Recorder
Exit code:
0
Version:
3.0.0.945
Modules
Images
c:\users\admin\appdata\local\haji\iscrpaint.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5880\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
6 051
Read events
5 788
Write events
245
Delete events
18

Modification events

(PID) Process:(5004) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
480000000000000027086188AE4BDB018C130000A8170000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5004) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
480000000000000027086188AE4BDB018C130000A8170000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5004) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
48000000000000000C86B488AE4BDB018C130000A8170000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5004) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
48000000000000000C86B488AE4BDB018C130000A8170000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5004) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
480000000000000072D6B688AE4BDB018C130000A8170000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5004) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
480000000000000071A0BB88AE4BDB018C130000A8170000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5004) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(5004) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000CE723089AE4BDB018C130000A8170000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5004) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000007DD73289AE4BDB018C130000C8040000E80300000100000000000000000000002E46A14DCC73FB4EB21D4071A5CB9DF700000000000000000000000000000000
(PID) Process:(2092) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
480000000000000063663C89AE4BDB012C080000C4140000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
4
Suspicious files
13
Text files
0
Unknown types
7

Dropped files

PID
Process
Filename
Type
5004msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{4da1462e-73cc-4efb-b21d-4071a5cb9df7}_OnDiskSnapshotProp
MD5:
SHA256:
5004msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
5004msiexec.exeC:\Windows\Installer\13f82e.msi
MD5:
SHA256:
5004msiexec.exeC:\Windows\Temp\~DF846F1F1A28973FD6.TMP
MD5:
SHA256:
5004msiexec.exeC:\Windows\Installer\13f830.msi
MD5:
SHA256:
5004msiexec.exeC:\Windows\Temp\~DF48872CFDFF8B438D.TMP
MD5:
SHA256:
5004msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:437416A3D00C0863C5CA0EE9CF74E683
SHA256:B01D8DF8D082B55F4F67B5D36FE187B39BCF33D7D9F889929C6234C86B59C6A2
5004msiexec.exeC:\Windows\Temp\~DFB15FD9F7A24696F3.TMPgmc
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
5004msiexec.exeC:\Windows\Temp\~DF0EA5FBCA62F2EBA9.TMPgmc
MD5:1F331356C1C942B43272E59F8AFE675C
SHA256:62BB20D5E621BB831F3F1DB34412D41F4991224408AE893B5429052978A2E9E8
5004msiexec.exeC:\Windows\Temp\~DFE41DE8054EDA3347.TMPgmc
MD5:EC34528350542507E0E7672822D91B9B
SHA256:BCC5F2736DEB91F91F793A685202C8DED94042E5845D950609A292D97815FAF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
22
DNS requests
15
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1356
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.212.216.106:443
https://steamcommunity.com/profiles/76561199724331900
unknown
html
34.3 Kb
whitelisted
POST
200
188.114.97.3:443
https://gradefuture.click/api
unknown
text
17 b
POST
200
188.114.97.3:443
https://covery-mover.biz/api
unknown
text
17 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
104.126.37.131:443
Akamai International B.V.
DE
unknown
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1356
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3152
explorer.exe
188.114.96.3:443
gradefuture.click
CLOUDFLARENET
NL
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
gradefuture.click
  • 188.114.96.3
  • 188.114.97.3
unknown
se-blurry.biz
malicious
zinc-sneark.biz
malicious
dwell-exclaim.biz
malicious
formy-spill.biz
malicious
covery-mover.biz
  • 188.114.97.3
  • 188.114.96.3
malicious

Threats

PID
Process
Class
Message
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Suspected Malicious Domain by Cloudflare (zinc-sneark .biz)
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (zinc-sneark .biz)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (se-blurry .biz)
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (formy-spill .biz)
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (dwell-exclaim .biz)
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (covery-mover .biz)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (covery-mover .biz in TLS SNI)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (covery-mover .biz in TLS SNI)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (print-vexer .biz)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (dare-curbys .biz)
No debug info