File name:

2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom

Full analysis: https://app.any.run/tasks/d6fd2fc5-6037-4ae5-a60d-d9944c9dd10b
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: May 18, 2025, 05:01:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
lumma
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 9 sections
MD5:

8C7FBD88C6968B304F14D65D67ED088E

SHA1:

1C6733A67ABE49E7E8F14D81CA8F9BE1A972B21E

SHA256:

8F0718082010E7697AC80FF65C6A2779426C20609D912A4025201487A5CF3794

SSDEEP:

49152:RSZQqnIi1cSHmuWZ8xpP2lpTD7RJ6E80GYcGGReb6yn6A50uZ13yJ4P2lpTD7RJO:RSZWiD68xdSpXFJJVGYcG1+yn6A57Z1L

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe (PID: 7148)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2196)
      • MSBuild.exe (PID: 6540)
    • Connects to the CnC server

      • svchost.exe (PID: 2196)
    • LUMMA mutex has been found

      • MSBuild.exe (PID: 6540)
  • SUSPICIOUS

    • Executes application which crashes

      • 2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe (PID: 7148)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2196)
      • MSBuild.exe (PID: 6540)
    • Searches for installed software

      • MSBuild.exe (PID: 6540)
  • INFO

    • Reads the computer name

      • MSBuild.exe (PID: 6540)
    • Checks supported languages

      • MSBuild.exe (PID: 6540)
      • 2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe (PID: 7148)
    • Reads the software policy settings

      • MSBuild.exe (PID: 6540)
      • slui.exe (PID: 2268)
    • Reads the machine GUID from the registry

      • MSBuild.exe (PID: 6540)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 1452)
    • Checks proxy server information

      • slui.exe (PID: 2268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:14 17:59:14+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 222720
InitializedDataSize: 68096
UninitializedDataSize: -
EntryPoint: 0x21538
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe msbuild.exe no specs #LUMMA msbuild.exe werfault.exe no specs #LUMMA svchost.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1452C:\WINDOWS\system32\WerFault.exe -u -p 7148 -s 232C:\Windows\System32\WerFault.exe2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2268C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2320"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6540"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
7148"C:\Users\admin\Desktop\2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe" C:\Users\admin\Desktop\2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
8 519
Read events
8 519
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
1452WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2025-05-18_8c7fb_bcb316abc4e2d6d152843f9dda5afa97f203768_a0f2235d_a05b6138-d36a-4af0-a0a0-0d0f0a6eb236\Report.wer
MD5:
SHA256:
1452WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF204.tmp.WERInternalMetadata.xmlbinary
MD5:6A7BDCC1C86CB2DA57A698203EAC0765
SHA256:D08B63F703C2997DDE8B05F6CA5A690AF5F6690CDD745682F855992184A100AD
1452WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\2025-05-18_8c7fbd88c6968b304f14d65d67ed088e_black-basta_cobalt-strike_ryuk_satacom.exe.7148.dmpbinary
MD5:FCCF72E88E4B779035E64E7C466C8B45
SHA256:6428587E8D26FEE02CDF11285C7DC750A50AE480AC139BDD4F7DEB4FC1F83255
1452WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF186.tmp.dmpbinary
MD5:23B533D1D2584226F34EB6C44258FFDC
SHA256:D8A47C3A8C0427F4B3686BFB0739D7083726653080C5E4A1F852C58AB25EA631
1452WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF224.tmp.xmlxml
MD5:84B502C2A82E6A3752800F5B4E691FD6
SHA256:FE80EB189D8F8567E09448CC0404445FA0D5B1EA919CAE691AF4E9A1C51A805A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
26
DNS requests
7
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
6540
MSBuild.exe
104.21.96.1:443
cornerdurv.top
CLOUDFLARENET
unknown
4
System
192.168.100.255:137
whitelisted
4040
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2268
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
cornerdurv.top
  • 104.21.96.1
  • 104.21.112.1
  • 104.21.16.1
  • 104.21.80.1
  • 104.21.32.1
  • 104.21.48.1
  • 104.21.64.1
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
6540
MSBuild.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (cornerdurv .top) in TLS SNI
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cornerdurv .top)
Potentially Bad Traffic
ET INFO HTTP Request to a *.top domain
6540
MSBuild.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (cornerdurv .top) in TLS SNI
6540
MSBuild.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (cornerdurv .top) in TLS SNI
6540
MSBuild.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (cornerdurv .top) in TLS SNI
No debug info