File name:

Setup.exe

Full analysis: https://app.any.run/tasks/40fc5e83-1b5d-45fa-851c-575f39d1c50d
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: November 19, 2024, 08:40:59
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

0BF89E05C575D4BCDCDADB17C7517C29

SHA1:

1040DE2DCA7B63045E6F201B62FF782154E2693C

SHA256:

8CE1CDE3BD1FA2945AF8E03459775A87DBA7275C17401AB19E525B3238609F6B

SSDEEP:

98304:yF/25hDKmMMPLo3VP8No8wYxhHTSEw53mtABmYX7zdOaznAUQkCkXSGZySeIyM+i:irnmb9y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • msiexec.exe (PID: 644)
      • svchost.exe (PID: 2192)
    • Connects to the CnC server

      • svchost.exe (PID: 2192)
    • Executing a file with an untrusted certificate

      • Setup.exe (PID: 436)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • msiexec.exe (PID: 644)
      • svchost.exe (PID: 2192)
    • Starts the AutoIt3 executable file

      • msiexec.exe (PID: 644)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 644)
  • INFO

    • Checks supported languages

      • Setup.exe (PID: 436)
    • Reads the computer name

      • Setup.exe (PID: 436)
    • Create files in a temporary directory

      • Setup.exe (PID: 436)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:16 14:23:58+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 5441024
InitializedDataSize: 2231808
UninitializedDataSize: -
EntryPoint: 0x53215c
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.3.0.4
ProductVersionNumber: 1.3.0.4
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: RimArts Inc.
FileDescription: RimArts Setup applicatioin
FileVersion: 1, 3, 0, 4
InternalName: SETUP
LegalCopyright: Copyright © 1996 - 2021
OriginalFileName: SETUP.EXE
ProductName: RimArts Setup
ProductVersion: 1, 3, 0, 4
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start setup.exe no specs choice.exe no specs conhost.exe no specs #LUMMA msiexec.exe #LUMMA svchost.exe p8nzp2.com no specs

Process information

PID
CMD
Path
Indicators
Parent process
8C:\WINDOWS\SysWOW64\choice.exeC:\Windows\SysWOW64\choice.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
436"C:\Users\admin\AppData\Local\Temp\Setup.exe" C:\Users\admin\AppData\Local\Temp\Setup.exeexplorer.exe
User:
admin
Company:
RimArts Inc.
Integrity Level:
MEDIUM
Description:
RimArts Setup applicatioin
Exit code:
1
Version:
1, 3, 0, 4
Modules
Images
c:\users\admin\appdata\local\temp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
440\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exechoice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
644C:\WINDOWS\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe
choice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\liffissenfvc
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4540"C:\Users\admin\AppData\Roaming\P8NZP2.com" "C:\Users\admin\AppData\Roaming\JH8YOI.bin"C:\Users\admin\AppData\Roaming\P8NZP2.commsiexec.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 1
Modules
Images
c:\users\admin\appdata\roaming\p8nzp2.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
Total events
517
Read events
517
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
8choice.exeC:\Users\admin\AppData\Local\Temp\liffissenfvc
MD5:
SHA256:
644msiexec.exeC:\Users\admin\AppData\Roaming\JH8YOI.bin
MD5:
SHA256:
644msiexec.exeC:\Users\admin\AppData\Roaming\P8NZP2.comexecutable
MD5:3F58A517F1F4796225137E7659AD2ADB
SHA256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
436Setup.exeC:\Users\admin\AppData\Local\Temp\cc446ccdbinary
MD5:462F4CD6E764139303FADA8314A0E6B4
SHA256:7995AB10886CA958B0CEF2E9FFC58059332F86D0DF12FD644793AC7F13B5ECD2
436Setup.exeC:\Users\admin\AppData\Local\Temp\cc237875image
MD5:4615267061BD631365026A16EE70CCA1
SHA256:95E75DD101A71FE9F06C6D3104532907728812A0F9F7C5349CD9FDA0C148FB9E
8choice.exeC:\Windows\Tasks\ROG Live Service.jobbinary
MD5:69AC7B523691301B163C838B558CDA04
SHA256:39711E4B3C599DC7D3341032107F2E7FE0BC1AF708DCD2E8DBC9FB2FCDB15ECB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
33
DNS requests
15
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1488
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1488
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1020
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4932
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1820
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5064
SearchApp.exe
2.23.209.137:443
www.bing.com
Akamai International B.V.
GB
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
644
msiexec.exe
104.21.4.107:443
sliperyedhby.icu
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
www.bing.com
  • 2.23.209.137
  • 2.23.209.193
  • 2.23.209.133
  • 2.23.209.135
  • 2.23.209.189
  • 2.23.209.131
  • 2.23.209.130
  • 2.23.209.132
  • 2.23.209.186
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.136
  • 40.126.32.76
  • 40.126.32.140
  • 40.126.32.138
  • 40.126.32.134
  • 20.190.160.20
  • 40.126.32.133
  • 40.126.32.72
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
sliperyedhby.icu
  • 104.21.4.107
  • 172.67.131.254
unknown
rasa.r2cloudlokizyo9.shop
  • 104.21.65.221
  • 172.67.193.130
unknown
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
644
msiexec.exe
Potentially Bad Traffic
ET INFO Suspicious Domain (*.icu) in TLS SNI
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sliperyedhby .icu)
644
msiexec.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (sliperyedhby .icu in TLS SNI)
2192
svchost.exe
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .icu Domain
644
msiexec.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (sliperyedhby .icu in TLS SNI)
644
msiexec.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (sliperyedhby .icu in TLS SNI)
644
msiexec.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (sliperyedhby .icu in TLS SNI)
644
msiexec.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (sliperyedhby .icu in TLS SNI)
644
msiexec.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (sliperyedhby .icu in TLS SNI)
No debug info