File name:

samplejan23.exe

Full analysis: https://app.any.run/tasks/f9e7bcdd-6359-4b5b-b883-4fe665dd6919
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: January 23, 2025, 17:42:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phishing
arch-exec
lumma
stealer
Indicators:
MIME: text/plain
File info: ASCII text
MD5:

68BDDAC7AC658F9F72B58F984399756F

SHA1:

F424B6C82945DDB068F8F7BC2F6FF2A72F5BF2D9

SHA256:

CEC8EDD890E127B429F7801501F8637036048CA6F2D3C64B2C4D64F2168B07FD

SSDEEP:

24:WYZAQs79N1K28Tm1K2n5fofip1K2N8Fsbm9SipUEiexK1BvQ1K22ftJnSO:WYOT1KPm1Kp6p1KSM7SiiyK1S1KlbSO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6356)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 6356)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2192)
    • The DLL Hijacking

      • rdpinit.exe (PID: 7088)
    • LUMMA has been detected (SURICATA)

      • rdpinit.exe (PID: 7088)
      • svchost.exe (PID: 2192)
    • Actions looks like stealing of personal data

      • rdpinit.exe (PID: 7088)
    • Connects to the CnC server

      • svchost.exe (PID: 2192)
    • LUMMA mutex has been found

      • rdpinit.exe (PID: 7088)
    • Steals credentials from Web Browsers

      • rdpinit.exe (PID: 7088)
  • SUSPICIOUS

    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 6356)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 6356)
    • Connects to FTP

      • powershell.exe (PID: 6356)
    • Process drops legitimate windows executable

      • powershell.exe (PID: 6356)
    • Connects to unusual port

      • powershell.exe (PID: 6356)
    • Extracts files to a directory (POWERSHELL)

      • powershell.exe (PID: 6356)
    • Starts a Microsoft application from unusual location

      • rdpinit.exe (PID: 7088)
    • Contacting a server suspected of hosting an CnC

      • rdpinit.exe (PID: 7088)
      • svchost.exe (PID: 2192)
    • Searches for installed software

      • rdpinit.exe (PID: 7088)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 6356)
    • Checks proxy server information

      • powershell.exe (PID: 6356)
    • The sample compiled with chinese language support

      • powershell.exe (PID: 6356)
    • The sample compiled with english language support

      • powershell.exe (PID: 6356)
    • The process uses the downloaded file

      • powershell.exe (PID: 6356)
    • The executable file from the user directory is run by the Powershell process

      • rdpinit.exe (PID: 7088)
    • Checks supported languages

      • rdpinit.exe (PID: 7088)
    • Reads the computer name

      • rdpinit.exe (PID: 7088)
    • Reads the software policy settings

      • rdpinit.exe (PID: 7088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe conhost.exe no specs #PHISHING svchost.exe #LUMMA rdpinit.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6356"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\AppData\Local\Temp\samplejan23.exe.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6364\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7088"C:\Users\admin\AppData\Local\Temp\aip\rdpinit.exe" C:\Users\admin\AppData\Local\Temp\aip\rdpinit.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
RemoteApp Logon Application
Exit code:
0
Version:
10.0.26100.1882 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\aip\rdpinit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
Total events
6 006
Read events
6 006
Write events
0
Delete events
0

Modification events

No data
Executable files
7
Suspicious files
6
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
6356powershell.exeC:\Users\admin\AppData\Local\Temp\aip\wtsapi32.dll
MD5:
SHA256:
6356powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_iuxpvihr.nt5.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6356powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF1360d0.TMPbinary
MD5:D040F64E9E7A2BB91ABCA5613424598E
SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670
6356powershell.exeC:\Users\admin\AppData\Local\Temp\a7wm.zipcompressed
MD5:8D124E2D5FEA9F3E5A5C618487F1E00E
SHA256:8160EA4AFFFED97A719545B2E540F1202CE78D82327CA44052BDDBBD6957C549
6356powershell.exeC:\Users\admin\AppData\Local\Temp\aip\concrt140.dllexecutable
MD5:3D0EA6BA3551AEC4717AB2827319A741
SHA256:1573721C06F70D779F5AEBA175C039202069DA15D8526C3CE0C19B8C7FA985B1
6356powershell.exeC:\Users\admin\AppData\Local\Temp\aip\atl90.dllexecutable
MD5:64ECA1F64E4A988A6C5C93F3E5D66236
SHA256:AB93DF816C284AC247B9087663BC449BEB26E6F64D9F8A6BE2EFECAFA7A9CEDC
6356powershell.exeC:\Users\admin\AppData\Local\Temp\aip\openh264.dllexecutable
MD5:27C205D845CAAE7BADCC3C89AA973B3D
SHA256:40620FEB4B152F33980F535A94B5AA87716D69BAEE47BFB543FEA9C8F886540D
6356powershell.exeC:\Users\admin\AppData\Local\Temp\aip\Junction.wavbinary
MD5:607B605A5F721B9346CA8532F15C623D
SHA256:E344E562D0D3C9365D1154C5501EF7FA7E9158210CD28D4F9F778669DA44A0AE
6356powershell.exeC:\Users\admin\AppData\Local\Temp\aip\Microsoft.VC90.ATL.manifestxml
MD5:B41644A01C05740576B4E77662C7E86C
SHA256:A9A98FC7062262A47A1C0727339C760D18589B8549E4267762F7F4C88A103632
6356powershell.exeC:\Users\admin\AppData\Local\Temp\aip\Config.dllexecutable
MD5:44C53815BB1E3E73A9A9EFD6F8313E12
SHA256:B38986D99C8858BEAD5D8DD8B580DF1C8DD86ABF7E463A923264BE58559403F7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
41
DNS requests
26
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
1.01 Kb
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
binary
471 b
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
DE
binary
973 b
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
US
binary
313 b
whitelisted
7132
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
DE
binary
408 b
whitelisted
5872
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
US
binary
471 b
whitelisted
7132
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
DE
binary
419 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.169:443
www.bing.com
Akamai International B.V.
DE
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1176
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1076
svchost.exe
23.213.166.81:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.206
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.bing.com
  • 104.126.37.169
  • 104.126.37.185
  • 104.126.37.129
  • 104.126.37.139
  • 104.126.37.176
  • 104.126.37.170
  • 104.126.37.144
  • 104.126.37.163
  • 104.126.37.130
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.136
  • 40.126.32.134
  • 40.126.32.72
  • 40.126.32.74
  • 40.126.32.76
  • 40.126.32.133
  • 40.126.32.138
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
shaileshvisionaryastrologer.com
  • 167.86.109.19
malicious
arc.msn.com
  • 20.223.36.55
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (shaileshvisionaryastrologer .com)
6356
powershell.exe
Misc activity
ET HUNTING ZIP file download over raw TCP
7088
rdpinit.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (suggestyuoz .biz in TLS SNI)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (suggestyuoz .biz)
7088
rdpinit.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (suggestyuoz .biz in TLS SNI)
7088
rdpinit.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (suggestyuoz .biz in TLS SNI)
7088
rdpinit.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (suggestyuoz .biz in TLS SNI)
7088
rdpinit.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (suggestyuoz .biz in TLS SNI)
7088
rdpinit.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (suggestyuoz .biz in TLS SNI)
No debug info