File name:

SET_UP.exe

Full analysis: https://app.any.run/tasks/83aa7ada-0a3d-4ca3-82ee-e98e12773558
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: December 14, 2024, 12:16:45
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
stealer
lumma
autoit-loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

3D7985D235DDDD50133C9CB4D05E93CF

SHA1:

F4760735FAC36EE4453905208EE47589526A30C7

SHA256:

7FEB04DD3086C567C461E43A682DD1BFDF1CDE3C8F37338A87656FC81A23BA5D

SSDEEP:

98304:4W0JMnH6lSPaAny7ahqeITAUa/TsEnLz5hxBBDgS8BQX/N5qjtGm5IcDP:QMjX1mlP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2192)
    • Actions looks like stealing of personal data

      • Stored.com (PID: 8)
    • Steals credentials from Web Browsers

      • Stored.com (PID: 8)
    • AutoIt loader has been detected (YARA)

      • Stored.com (PID: 8)
    • LUMMA mutex has been found

      • Stored.com (PID: 8)
  • SUSPICIOUS

    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 2972)
    • Starts CMD.EXE for commands execution

      • SET_UP.exe (PID: 4132)
      • cmd.exe (PID: 2972)
    • Reads security settings of Internet Explorer

      • SET_UP.exe (PID: 4132)
    • Executing commands from ".cmd" file

      • SET_UP.exe (PID: 4132)
    • Application launched itself

      • cmd.exe (PID: 2972)
    • Get information on the list of running processes

      • cmd.exe (PID: 2972)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2972)
    • The executable file from the user directory is run by the CMD process

      • Stored.com (PID: 8)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 2972)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 2972)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2192)
  • INFO

    • Checks supported languages

      • SET_UP.exe (PID: 4132)
      • Stored.com (PID: 8)
    • Reads the computer name

      • SET_UP.exe (PID: 4132)
      • Stored.com (PID: 8)
    • Create files in a temporary directory

      • SET_UP.exe (PID: 4132)
    • Process checks computer location settings

      • SET_UP.exe (PID: 4132)
    • The process uses the downloaded file

      • SET_UP.exe (PID: 4132)
    • Creates a new folder

      • cmd.exe (PID: 3612)
    • Reads mouse settings

      • Stored.com (PID: 8)
    • Reads the machine GUID from the registry

      • Stored.com (PID: 8)
    • Reads the software policy settings

      • Stored.com (PID: 8)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 5
ImageVersion: 6
OSVersion: 5
EntryPoint: 0x38af
UninitializedDataSize: 16896
InitializedDataSize: 511488
CodeSize: 29696
LinkerVersion: 10
PEType: PE32
ImageFileCharacteristics: Executable, 32-bit
TimeStamp: 2012:02:24 19:20:04+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
13
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start set_up.exe no specs cmd.exe conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs #LUMMA stored.com choice.exe no specs #LUMMA svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
4132"C:\Users\admin\Desktop\SET_UP.exe" C:\Users\admin\Desktop\SET_UP.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\set_up.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2972"C:\Windows\System32\cmd.exe" /c copy Figured Figured.cmd && Figured.cmdC:\Windows\SysWOW64\cmd.exe
SET_UP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
396\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1804tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5460findstr /I "wrsa opssvc" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5572tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5028findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3612cmd /c md 516983C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
188findstr /V "ProposedKellyChampionCouldMinistryPhotographersNotFruit" Permitted C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1356cmd /c copy /b ..\Imposed + ..\Wellington + ..\Object + ..\Installations + ..\Loaded + ..\Hdtv U C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
3 972
Read events
3 972
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
16
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4132SET_UP.exeC:\Users\admin\AppData\Local\Temp\Locatorabr
MD5:85E9FAB9AB9A2CE1935F980078995C7B
SHA256:0392E54997947D4E6AC2A5A919F18699DB82524DA641AA913B9E360BB2A1D7DF
4132SET_UP.exeC:\Users\admin\AppData\Local\Temp\Installationspgc
MD5:D028BA6B6939326C7BD30516E21E4FF4
SHA256:7C1AA8EC4C791E4DB7CE1D95DB8C9DF75BAAC3BFB0CB0F1EC56064C88D09BC0D
4132SET_UP.exeC:\Users\admin\AppData\Local\Temp\Questbinary
MD5:05C707C8F33E056405D5138D7CBAC25B
SHA256:0815C0EFAB440E5298F28FE5D266AD8DEA60EADB3A82DB46C95ADBE2B6EEADB0
2972cmd.exeC:\Users\admin\AppData\Local\Temp\Figured.cmdtext
MD5:21350FCCD60418B01CF83AC826AA31E9
SHA256:BE21F7CA2001511FBC3E0E43312F8649E83037EBF098682D5FA1D290E62BF470
4132SET_UP.exeC:\Users\admin\AppData\Local\Temp\Transportmp3
MD5:29310511E646A9DB8EC20112F750205A
SHA256:92572FF759F59420EB6EF712DC8DB8469C63425F0B2AB5798EBB19370FFB61E1
4132SET_UP.exeC:\Users\admin\AppData\Local\Temp\Joelmp3
MD5:FED092A988D0DB96E611A27280DD05B7
SHA256:8CD6962716B0B9BF77F28D1A37238CBDCB09FDB97F0761FF224B78201227CCB3
4132SET_UP.exeC:\Users\admin\AppData\Local\Temp\Figuredtext
MD5:21350FCCD60418B01CF83AC826AA31E9
SHA256:BE21F7CA2001511FBC3E0E43312F8649E83037EBF098682D5FA1D290E62BF470
4132SET_UP.exeC:\Users\admin\AppData\Local\Temp\Hadbinary
MD5:8402510886C8CEB4FD093BBAFA8F452B
SHA256:68B1859430203661F8D31A767909364F645DA1944D6FD0C4CD4EA79C2F2C6212
1356cmd.exeC:\Users\admin\AppData\Local\Temp\516983\Ubinary
MD5:76435283F8EC4F375A9D474DEA552242
SHA256:2283D849D6BE570BB6EFAF7440F53B52ED9C8ACE2844B838C98A53E0322764D0
4132SET_UP.exeC:\Users\admin\AppData\Local\Temp\Permittedbinary
MD5:443F5628E48F754B7751D344B9C4C88A
SHA256:5339E4495D03B9301B7D15424DB91B68B7E84B3DCF769B5F44B7CAF7FAB66DE4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
28
DNS requests
7
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
200
104.21.78.51:443
https://futipoy.shop/api
unknown
text
20.4 Kb
POST
200
172.67.216.241:443
https://futipoy.shop/api
unknown
text
2 b
POST
200
172.67.216.241:443
https://futipoy.shop/api
unknown
text
140 b
POST
200
172.67.216.241:443
https://futipoy.shop/api
unknown
text
14 b
POST
200
104.21.78.51:443
https://futipoy.shop/api
unknown
text
14 b
POST
200
172.67.216.241:443
https://futipoy.shop/api
unknown
text
14 b
POST
200
104.21.78.51:443
https://futipoy.shop/api
unknown
text
14 b
POST
200
104.21.78.51:443
https://futipoy.shop/api
unknown
text
14 b
POST
200
172.67.216.241:443
https://futipoy.shop/api
unknown
text
14 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
2.23.209.130:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.168.100.255:138
whitelisted
8
Stored.com
172.67.216.241:443
futipoy.shop
CLOUDFLARENET
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
www.bing.com
  • 2.23.209.130
  • 2.23.209.182
  • 2.23.209.185
  • 2.23.209.179
  • 2.23.209.149
  • 2.23.209.140
  • 2.23.209.187
  • 2.23.209.189
  • 2.23.209.133
whitelisted
google.com
  • 142.250.185.78
whitelisted
trxBhEXoOi.trxBhEXoOi
unknown
futipoy.shop
  • 172.67.216.241
  • 104.21.78.51
unknown
klipcatepiu0.shop
unknown
self.events.data.microsoft.com
  • 51.104.15.252
whitelisted

Threats

PID
Process
Class
Message
Domain Observed Used for C2 Detected
STEALER [ANY.RUN] Suspected Lumma domain by CrossDomain (klipcatepiu0 .shop)
No debug info