File name:

Netflix mail access Checker 2024.exe

Full analysis: https://app.any.run/tasks/6245690f-ae87-4ead-b064-a6981d767a2d
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: August 20, 2024, 18:32:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
crypto-regex
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

1F3B95E3DB5EAC6C60291820F7AB258A

SHA1:

2BFDE7B1D9BB203199DED93EADDA15E9C9451747

SHA256:

C9861725FE8937EDF1F735FB88FBCEE1E18FC1AE4B0B5F979084EF592B8C890B

SSDEEP:

24576:VhQfxECFp91Z3JthrGGRxqDMt4e8zY85/lstUC8LCD9:V2fxECFp91Z3JthrGKxqDMt4e8M85/lU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • RegAsm.exe (PID: 6916)
    • Actions looks like stealing of personal data

      • RegAsm.exe (PID: 6908)
    • Connects to the CnC server

      • svchost.exe (PID: 2256)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2256)
      • RegAsm.exe (PID: 6908)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • Netflix mail access Checker 2024.exe (PID: 6712)
    • Process drops legitimate windows executable

      • RegAsm.exe (PID: 6800)
      • Netflix mail access Checker 2024.exe (PID: 6712)
      • RegAsm.exe (PID: 6916)
    • Reads security settings of Internet Explorer

      • RegAsm.exe (PID: 6800)
    • Drops the executable file immediately after the start

      • RegAsm.exe (PID: 6800)
      • Netflix mail access Checker 2024.exe (PID: 6712)
      • RegAsm.exe (PID: 6916)
    • Executable content was dropped or overwritten

      • RegAsm.exe (PID: 6800)
      • RegAsm.exe (PID: 6916)
    • Reads the date of Windows installation

      • RegAsm.exe (PID: 6800)
    • The process creates files with name similar to system file names

      • RegAsm.exe (PID: 6916)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2256)
      • RegAsm.exe (PID: 6908)
    • Searches for installed software

      • RegAsm.exe (PID: 6908)
    • Found regular expressions for crypto-addresses (YARA)

      • RegAsm.exe (PID: 6916)
  • INFO

    • Reads the computer name

      • Netflix mail access Checker 2024.exe (PID: 6712)
      • RegAsm.exe (PID: 6800)
      • RAreatCU4h.exe (PID: 6848)
      • C26Efy1fnm.exe (PID: 6868)
      • RegAsm.exe (PID: 6908)
      • RegAsm.exe (PID: 6916)
    • Creates files or folders in the user directory

      • RegAsm.exe (PID: 6800)
      • RegAsm.exe (PID: 6916)
    • Checks supported languages

      • RegAsm.exe (PID: 6800)
      • RAreatCU4h.exe (PID: 6848)
      • Netflix mail access Checker 2024.exe (PID: 6712)
      • C26Efy1fnm.exe (PID: 6868)
      • RegAsm.exe (PID: 6916)
      • RegAsm.exe (PID: 6908)
    • Process checks computer location settings

      • RegAsm.exe (PID: 6800)
    • Reads the software policy settings

      • RegAsm.exe (PID: 6908)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:20 17:39:38+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 543232
InitializedDataSize: 2560
UninitializedDataSize: -
EntryPoint: 0x8685e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 10.0.19041.3636
ProductVersionNumber: 10.0.19041.3636
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Auto File System Format Utility
FileVersion: 10.0.19041.3636 (WinBuild.160101.0800)
InternalName: autofmt
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: AUTOFMT.EXE
ProductName: Microsoft® Windows® Operating System
ProductVersion: 10.0.19041.3636
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
7
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start netflix mail access checker 2024.exe no specs regasm.exe rareatcu4h.exe no specs c26efy1fnm.exe no specs #LUMMA regasm.exe THREAT regasm.exe #LUMMA svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6712"C:\Users\admin\AppData\Local\Temp\Netflix mail access Checker 2024.exe" C:\Users\admin\AppData\Local\Temp\Netflix mail access Checker 2024.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Auto File System Format Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\netflix mail access checker 2024.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6800"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
Netflix mail access Checker 2024.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6848"C:\Users\admin\AppData\Roaming\RAreatCU4h.exe" C:\Users\admin\AppData\Roaming\RAreatCU4h.exeRegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Auto File System Format Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\roaming\rareatcu4h.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6868"C:\Users\admin\AppData\Roaming\C26Efy1fnm.exe" C:\Users\admin\AppData\Roaming\C26Efy1fnm.exeRegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Auto File System Format Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\roaming\c26efy1fnm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6908"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
RAreatCU4h.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6916"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C26Efy1fnm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
4 460
Read events
4 452
Write events
8
Delete events
0

Modification events

(PID) Process:(6800) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6800) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6800) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6800) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
3
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6800RegAsm.exeC:\Users\admin\AppData\Roaming\C26Efy1fnm.exeexecutable
MD5:804A74EC9E211DC6D5374D8FA2835292
SHA256:65AC4DB8E69FB8E5FF882524B9ABB4002AEDFCE7F7236B33CBDAACFFAE1A6C87
6916RegAsm.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.exeexecutable
MD5:0AEA1B49AEDB6C7BF4805DD5054DC0F7
SHA256:BD02B877C14DDC1E2DB118F32730B73B2E5AE792A84AC48F28957BEAFF2B83F9
6800RegAsm.exeC:\Users\admin\AppData\Roaming\RAreatCU4h.exeexecutable
MD5:52797862CB538F5D33D1FBDDBA126055
SHA256:F6421443F881D3FA16746ACE08AC6C34A5D4B640231AF205C5A118A09B3EB645
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
34
DNS requests
16
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1920
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2204
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3144
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
5144
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4760
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6908
RegAsm.exe
188.114.96.3:443
deicedosmzj.shop
CLOUDFLARENET
NL
unknown
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3144
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
3144
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2120
MoUsoCoreWorker.exe
52.140.118.28:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IN
unknown
1920
backgroundTaskHost.exe
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 52.140.118.28
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
deicedosmzj.shop
  • 188.114.96.3
  • 188.114.97.3
malicious
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 40.126.32.136
  • 40.126.32.72
  • 20.190.160.20
  • 20.190.160.17
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.74
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
6908
RegAsm.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (deicedosmzj .shop in TLS SNI)
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (deicedosmzj .shop)
6908
RegAsm.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (deicedosmzj .shop in TLS SNI)
6908
RegAsm.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (deicedosmzj .shop in TLS SNI)
6908
RegAsm.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (deicedosmzj .shop in TLS SNI)
6908
RegAsm.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (deicedosmzj .shop in TLS SNI)
6908
RegAsm.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (deicedosmzj .shop in TLS SNI)
No debug info