File name:

NewSetup.exe

Full analysis: https://app.any.run/tasks/9fb8bde9-7df0-461f-8912-b3b85b7e06f9
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: September 14, 2024, 10:28:04
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

CEE7A5AF9045CB0F957D7A16066C9CC6

SHA1:

14F663EE1E2E48F2D81D9E644329324E175AB5C2

SHA256:

8B91559DE9EE58817557F7C55CCA5D173937715FAB2AD76976DDEB0C1E5CFA20

SSDEEP:

6144:QjP5f1W6c0n0eUkKCLu1aHCBrnUTjI+9Xb6Vo2WhrEQQeNIsVH6UwM/mWlz+din+:aNS0n0T1aHQYw+tbsUceJH1wMnI8ab

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • svchost.exe (PID: 2256)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2256)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2256)
    • Executes application which crashes

      • NewSetup.exe (PID: 2180)
  • INFO

    • Checks supported languages

      • NewSetup.exe (PID: 2180)
      • RegAsm.exe (PID: 4284)
    • Reads the computer name

      • NewSetup.exe (PID: 2180)
      • RegAsm.exe (PID: 4284)
    • Checks proxy server information

      • WerFault.exe (PID: 4644)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 4644)
    • Reads the software policy settings

      • WerFault.exe (PID: 4644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (61.6)
.dll | Win32 Dynamic Link Library (generic) (14.6)
.exe | Win32 Executable (generic) (10)
.exe | Win16/32 Executable Delphi generic (4.6)
.exe | Generic Win/DOS Executable (4.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:27 11:32:31+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 369152
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x5c1de
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 1.0.0.3
ProductVersionNumber: 1.0.0.3
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription: Spokeswomen
FileVersion: 1.0.0.3
InternalName: Immovables.exe
LegalCopyright: Copyright © 2023
OriginalFileName: Immovables.exe
ProductName: Appestats
ProductVersion: 1.0.0.3
AssemblyVersion: 1.0.0.3
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start newsetup.exe conhost.exe no specs regasm.exe no specs werfault.exe #LUMMA svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2180"C:\Users\admin\Desktop\NewSetup.exe" C:\Users\admin\Desktop\NewSetup.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Spokeswomen
Exit code:
3221225477
Version:
1.0.0.3
Modules
Images
c:\users\admin\desktop\newsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3728\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeNewSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4284"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeNewSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
4644C:\WINDOWS\SysWOW64\WerFault.exe -u -p 2180 -s 892C:\Windows\SysWOW64\WerFault.exe
NewSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
6 414
Read events
6 414
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
4644WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_NewSetup.exe_44a615fe5f5432d7d7f4cda1554e6b1ac854bb69_1d53a5c4_dabe18e0-96c1-4376-954e-be126dbb89a2\Report.wer
MD5:
SHA256:
4644WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\NewSetup.exe.2180.dmp
MD5:
SHA256:
4644WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERAFEF.tmp.dmpdmp
MD5:C357AC80726906B935732633C18943DF
SHA256:98BCB3D4016A959A4BDC3C33487C97686633CC17A54BA6D26CDF7EC5071A30D3
4644WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERB139.tmp.xmlxml
MD5:5A7596C47142E91928F1620B3A7AA260
SHA256:C1BA7A10295B714558F7A2CDEC71F8228F4C557100B6BF254D08D2A4A0943D41
4644WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERB0EA.tmp.WERInternalMetadata.xmlxml
MD5:2D0F1382F19528D4217051E7CBCA034D
SHA256:F6F6060E40323AEACEF4A716F531502D1767ABF037C1E34C044D766CEAC76F2F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
19
DNS requests
20
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4132
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2120
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7072
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4132
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7072
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4132
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
7072
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2120
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4644
WerFault.exe
104.208.16.94:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4132
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.206
whitelisted
sideindexfollowragelrew.pw
malicious
cleartotalfisherwo.shop
malicious
www.microsoft.com
  • 184.30.21.171
whitelisted
worryfillvolcawoi.shop
malicious
enthusiasimtitleow.shop
malicious
watson.events.data.microsoft.com
  • 104.208.16.94
whitelisted
dismissalcylinderhostw.shop
malicious
affordcharmcropwo.shop
malicious

Threats

PID
Process
Class
Message
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (cleartotalfisherwo .shop)
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related Domain in DNS Lookup (sideindexfollowragelrew .pw)
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (enthusiasimtitleow .shop)
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (worryfillvolcawoi .shop)
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (enthusiasimtitleow .shop)
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (dismissalcylinderhostw .shop)
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (affordcharmcropwo .shop)
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (dismissalcylinderhostw .shop)
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (affordcharmcropwo .shop)
No debug info