File name:

Set-up_patched.exe

Full analysis: https://app.any.run/tasks/12fcd462-a2eb-4705-ac99-116c4cc00125
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: February 09, 2025, 17:22:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
delphi
pastebin
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

F34D52BBD5853539643D788060BB3D4B

SHA1:

404FEC01ECEC3F25F29DEDB3468F2812B3F1B5ED

SHA256:

8C2545B371080E7B1479ADE14A3B5D13EDD2B321216579A2BC2241D8F9C27FDF

SSDEEP:

98304:BDAe+t8isFPgpm1isNVIkmnQ9/+ClS3PqYKgxJpZcSISrllUr4JiD:q7Ih

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • svchost.exe (PID: 2192)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2192)
      • Set-up_patched.exe (PID: 6504)
    • LUMMA mutex has been found

      • Set-up_patched.exe (PID: 6504)
    • Steals credentials from Web Browsers

      • Set-up_patched.exe (PID: 6504)
    • Actions looks like stealing of personal data

      • Set-up_patched.exe (PID: 6504)
    • LUMMA has been detected (YARA)

      • Set-up_patched.exe (PID: 6504)
    • Changes powershell execution policy (Bypass)

      • Set-up_patched.exe (PID: 6504)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7100)
      • powershell.exe (PID: 7156)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2192)
      • Set-up_patched.exe (PID: 6504)
    • There is functionality for taking screenshot (YARA)

      • Set-up_patched.exe (PID: 6504)
    • Searches for installed software

      • Set-up_patched.exe (PID: 6504)
    • Starts POWERSHELL.EXE for commands execution

      • Set-up_patched.exe (PID: 6504)
    • The process executes Powershell scripts

      • Set-up_patched.exe (PID: 6504)
  • INFO

    • Checks supported languages

      • Set-up_patched.exe (PID: 6504)
    • The sample compiled with english language support

      • Set-up_patched.exe (PID: 6504)
    • Reads the computer name

      • Set-up_patched.exe (PID: 6504)
    • Reads the software policy settings

      • Set-up_patched.exe (PID: 6504)
    • Compiled with Borland Delphi (YARA)

      • Set-up_patched.exe (PID: 6504)
    • Create files in a temporary directory

      • Set-up_patched.exe (PID: 6504)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7100)
      • powershell.exe (PID: 7156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (79.7)
.exe | Win32 Executable (generic) (8.6)
.exe | Win16/32 Executable Delphi generic (3.9)
.exe | Generic Win/DOS Executable (3.8)
.exe | DOS Executable Generic (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:11 22:42:05+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 2155520
InitializedDataSize: 280064
UninitializedDataSize: -
EntryPoint: 0x20fadc
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 29.0.53982.329
ProductVersionNumber: 29.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Embarcadero Technologies, Inc.
FileDescription: Embarcadero Dr. Interop
FileVersion: 29.0.53982.0329
InternalName: DRINTEROP
LegalCopyright: Copyright © 2005-2024 Embarcadero Technologies, Inc.
OriginalFileName: DRINTEROP.exe
ProductName: Embarcadero Dr. Interop Utility
ProductVersion: 29
InternalRevision: 120329
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LUMMA set-up_patched.exe #LUMMA svchost.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs set-up_patched.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6148\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6356"C:\Users\admin\Desktop\Set-up_patched.exe" C:\Users\admin\Desktop\Set-up_patched.exeexplorer.exe
User:
admin
Company:
Embarcadero Technologies, Inc.
Integrity Level:
MEDIUM
Description:
Embarcadero Dr. Interop
Exit code:
3221226540
Version:
29.0.53982.0329
Modules
Images
c:\users\admin\desktop\set-up_patched.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6504"C:\Users\admin\Desktop\Set-up_patched.exe" C:\Users\admin\Desktop\Set-up_patched.exe
explorer.exe
User:
admin
Company:
Embarcadero Technologies, Inc.
Integrity Level:
HIGH
Description:
Embarcadero Dr. Interop
Exit code:
0
Version:
29.0.53982.0329
Modules
Images
c:\users\admin\desktop\set-up_patched.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
7100powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\JHNGOKMFN4VQ2JKN90PMRI67CNV.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSet-up_patched.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7108\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7156powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\XECGO6D1UPOXTMZRRZXJ21I.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSet-up_patched.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
8 265
Read events
8 265
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
7100powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lt0ewir3.bhx.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6504Set-up_patched.exeC:\Users\admin\AppData\Local\Temp\JHNGOKMFN4VQ2JKN90PMRI67CNV.ps1html
MD5:9EF303F48303B543C7DEA68F560FE795
SHA256:464507F2C132DA0B5AAA45F95372871DD14C42D1A156AC746F602AA41CCFBB2E
7156powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_xvxa0tw5.gia.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7156powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:8D6528307691366286C7CED3CC3C26AF
SHA256:EDB87414A148398DBCF987802818B16D699A8A85CB3EEC0D818F02031598D503
6504Set-up_patched.exeC:\Users\admin\AppData\Local\Temp\XECGO6D1UPOXTMZRRZXJ21I.ps1html
MD5:108A846FCE8E14BEC7A3A8C2850D8ED1
SHA256:300C5BFA2B54A6C48FB592BA9F2A164DC92D796688F3E43112E696E68A09ED88
7100powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ubg3bqgs.fuy.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7156powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ba30g5ot.zsl.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
35
DNS requests
14
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3612
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3612
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1520
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.160.65:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
23.213.166.81:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.16.110.137:443
Akamai International B.V.
DE
unknown
524
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6504
Set-up_patched.exe
172.67.173.71:443
brightqhorizons.cloud
CLOUDFLARENET
US
unknown
6504
Set-up_patched.exe
188.114.96.3:443
importenptoc.com
CLOUDFLARENET
NL
malicious

DNS requests

Domain
IP
Reputation
ocsp.digicert.com
  • 2.17.190.73
whitelisted
login.live.com
  • 20.190.160.65
  • 40.126.32.134
  • 40.126.32.140
  • 20.190.160.128
  • 40.126.32.76
  • 40.126.32.138
  • 20.190.160.5
  • 20.190.160.22
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
brightqhorizons.cloud
  • 172.67.173.71
  • 104.21.96.52
unknown
importenptoc.com
  • 188.114.96.3
  • 188.114.97.3
malicious
rentry.co
  • 104.26.2.16
  • 172.67.75.40
  • 104.26.3.16
unknown
pastebin.com
  • 104.20.4.235
  • 104.20.3.235
  • 172.67.19.24
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (importenptoc .com)
6504
Set-up_patched.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (importenptoc .com in TLS SNI)
6504
Set-up_patched.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (importenptoc .com in TLS SNI)
6504
Set-up_patched.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (importenptoc .com in TLS SNI)
6504
Set-up_patched.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (importenptoc .com in TLS SNI)
6504
Set-up_patched.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (importenptoc .com in TLS SNI)
2192
svchost.exe
Misc activity
ET INFO Pastebin Service Domain in DNS Lookup (rentry .co)
6504
Set-up_patched.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (importenptoc .com in TLS SNI)
6504
Set-up_patched.exe
Misc activity
ET INFO Observed Pastebin Service Domain (rentry .co in TLS SNI)
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
No debug info