File name:

FileS-0pen.rar

Full analysis: https://app.any.run/tasks/3665fa8b-ded8-4c9e-91f4-aceaa0f25afc
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: November 22, 2024, 08:19:51
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
pastebin
autoit
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

7E404F66075E668088E19DB0614ACAEB

SHA1:

6F0639DE0762870B9D045042DC3E07BB50B4EA85

SHA256:

B5E8E250D6169F1D9DDFE515352C6E3E7FAC563196E64B2CAEA69C0B59F3DEEA

SSDEEP:

98304:73rm7eM6Mtgqfj9/qGL3vZZ7MUUi1wZFZtNQMnTBSqQs8BsebyepF7dHpwGHfEVW:9hhVRuxtFvZcXHTW4an/awo+D

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (YARA)

      • msiexec.exe (PID: 6648)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6748)
      • powershell.exe (PID: 6800)
      • powershell.exe (PID: 7104)
    • Known privilege escalation attack

      • dllhost.exe (PID: 6276)
    • Changes powershell execution policy (Bypass)

      • msiexec.exe (PID: 6648)
      • powershell.exe (PID: 6800)
    • LUMMA has been detected (SURICATA)

      • msiexec.exe (PID: 6648)
    • Stealers network behavior

      • msiexec.exe (PID: 6648)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 1296)
      • Setup.exe (PID: 1156)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1296)
    • The process drops C-runtime libraries

      • Setup.exe (PID: 1156)
    • Executable content was dropped or overwritten

      • Setup.exe (PID: 1156)
    • Starts application with an unusual extension

      • Setup.exe (PID: 1156)
      • Setup.exe (PID: 6328)
      • msiexec.exe (PID: 6648)
    • The process executes Powershell scripts

      • msiexec.exe (PID: 6648)
    • Application launched itself

      • powershell.exe (PID: 6800)
    • BASE64 encoded PowerShell command has been detected

      • powershell.exe (PID: 6800)
    • Base64-obfuscated command line is found

      • powershell.exe (PID: 6800)
    • Starts POWERSHELL.EXE for commands execution

      • msiexec.exe (PID: 6648)
      • powershell.exe (PID: 6800)
    • Starts the AutoIt3 executable file

      • msiexec.exe (PID: 6648)
    • The process bypasses the loading of PowerShell profile settings

      • powershell.exe (PID: 6800)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 1296)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 1156)
    • Checks supported languages

      • Setup.exe (PID: 1156)
      • more.com (PID: 4044)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1296)
      • msiexec.exe (PID: 6648)
    • Reads the computer name

      • Setup.exe (PID: 1156)
      • more.com (PID: 4044)
    • Create files in a temporary directory

      • Setup.exe (PID: 1156)
    • Reads the machine GUID from the registry

      • more.com (PID: 4044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 105170
UncompressedSize: 373656
OperatingSystem: Win32
ArchivedFileName: FileS-0pen/config.prx
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
15
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe setup.exe more.com no specs conhost.exe no specs CMSTPLUA setup.exe no specs more.com no specs conhost.exe no specs #LUMMA msiexec.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs powershell.exe no specs acgzgv.com no specs

Process information

PID
CMD
Path
Indicators
Parent process
712\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1156"C:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\Setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\Setup.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1296.41838\files-0pen\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1296"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\FileS-0pen.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4044C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.comSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ulib.dll
6240"C:\Users\admin\AppData\Roaming\ACGZGV.com" "C:\Users\admin\AppData\Roaming\N656A7.csv"C:\Users\admin\AppData\Roaming\ACGZGV.commsiexec.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
HIGH
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 1
Modules
Images
c:\users\admin\appdata\roaming\acgzgv.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
6276C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
6328"C:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\Setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\Setup.exedllhost.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1296.41838\files-0pen\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6372C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.comSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6380\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6648C:\WINDOWS\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe
more.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\wqvxkd
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
17 644
Read events
17 621
Write events
23
Delete events
0

Modification events

(PID) Process:(1296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\FileS-0pen.rar
(PID) Process:(1296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1296) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6276) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(6800) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
Executable files
42
Suspicious files
7
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\Qt5Gui.dllexecutable
MD5:34893CB3D9A2250F0EDECD68AEDB72C7
SHA256:CA8334B2E63BC01F0749AFEB9E87943C29882131EFE58608EA25732961B2DF34
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\updater\manager\ks_tyres.initext
MD5:47F6571C7884DA6C743551AC724186D4
SHA256:894D3C57598ECB22C769CC3EA8219859A95E22740E72394A474012EA2119B3D9
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\Qt5Core.dllexecutable
MD5:A69021F31874D4AEFEC8C3A2BEDD4437
SHA256:DC68A1446E829AFA5C7E33F4DD2233E096A492BDF3A82EB0EEACFAFB69BDECBF
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\vcruntime140_1.dllexecutable
MD5:75E78E4BF561031D39F86143753400FF
SHA256:1758085A61527B427C4380F0C976D29A8BEE889F2AC480C356A3F166433BF70E
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\updater\NvStWiz.prxexecutable
MD5:9E82E3B658393BED3F7E4F090DF1FBE7
SHA256:C2AD5BD189DF04B39BE18DEC5CD251CF79B066010706AD26D99DF7E49FD07762
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\elquyuwbinary
MD5:233DF4BE28DB23E0649FA10A841D7D75
SHA256:98FF11E0C57EC557A2DF32742E91C012885B1C07B92E6E0A6A126427F3959B80
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\config.prxexecutable
MD5:14934CACA84D5FE0288F27EFB31DCBF8
SHA256:7FA86147035627BAE39576BCBE619D045E94A48C4DB8CA131968C20BB4DE4A36
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\Setup.exeexecutable
MD5:411CD1175B5E21B6A3C6A72C34E8773C
SHA256:116B75D94DACF676931FF8623A0B34F3EA75B52D67B0494FEFD1B8DCE6BC121A
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\msvcp140.dllexecutable
MD5:7DB24201EFEA565D930B7EC3306F4308
SHA256:72FE4598F0B75D31CE2DC621E8EF161338C6450BB017CD06895745690603729E
1296WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1296.41838\FileS-0pen\vcruntime140.dllexecutable
MD5:F12681A472B9DD04A812E16096514974
SHA256:D66C3B47091CEB3F8D3CC165A43D285AE919211A0C0FCB74491EE574D8D464F8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
44
DNS requests
25
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4932
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4932
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6496
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6496
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2164
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5492
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4932
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4932
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.128:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.186.174
whitelisted
www.bing.com
  • 104.126.37.128
  • 104.126.37.152
  • 104.126.37.139
  • 104.126.37.136
  • 104.126.37.144
  • 104.126.37.153
  • 104.126.37.130
  • 104.126.37.137
  • 104.126.37.146
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.64
  • 20.190.159.2
  • 20.190.159.23
  • 40.126.31.69
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.71
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
6648
msiexec.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6648
msiexec.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
No debug info