File name:

l6E.exe

Full analysis: https://app.any.run/tasks/28a09bbb-6759-439b-aae6-9fc8608dfde9
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: September 20, 2024, 19:00:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

FAC2188E4A28A0CF32BF4417D797B0F8

SHA1:

1970DE8788C07B548BF04D0062A1D4008196A709

SHA256:

D737637EE5F121D11A6F3295BF0D51B06218812B5EC04FE9EA484921E905A207

SSDEEP:

12288:inTM1KdN86/orkuLaxLdL9QgDaMgv2dTh0Ug:inQ1uN8rMLFCgDaMgvwThS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • RegAsm.exe (PID: 6624)
    • Stealers network behavior

      • RegAsm.exe (PID: 6624)
  • SUSPICIOUS

    • The executable file from the user directory is run by the CMD process

      • l6E.exe (PID: 6396)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:09:18 14:21:22+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 340992
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x552de
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: winterer dowered empressement
CompanyName: listening triskelion
FileDescription: outfawned
FileVersion: 1.0.0.0
InternalName: VQP.exe
LegalCopyright: Copyright 2024
OriginalFileName: VQP.exe
ProductName: Shopman Stairs
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs conhost.exe no specs l6e.exe no specs #LUMMA regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
6396C:\Users\admin\AppData\Local\Temp\l6E.exeC:\Users\admin\AppData\Local\Temp\l6E.execmd.exe
User:
admin
Company:
listening triskelion
Integrity Level:
MEDIUM
Description:
outfawned
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\l6e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6624"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
l6E.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6792\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6856"C:\Windows\System32\cmd.exe" /k C:\Users\admin\AppData\Local\Temp\l6E.exeC:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
3 302
Read events
3 302
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
40
DNS requests
12
Threats
9

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
13.69.109.130:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
92.123.104.32:443
Akamai International B.V.
DE
unknown
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
40.119.249.228:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
2120
MoUsoCoreWorker.exe
40.119.249.228:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
4324
svchost.exe
40.119.249.228:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6624
RegAsm.exe
49.13.77.253:443
eemmbryequo.shop
Hetzner Online GmbH
DE
malicious
6624
RegAsm.exe
23.197.127.21:443
steamcommunity.com
Akamai International B.V.
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 40.119.249.228
whitelisted
google.com
  • 142.250.185.174
whitelisted
eemmbryequo.shop
  • 49.13.77.253
malicious
keennylrwmqlw.shop
  • 49.13.77.253
malicious
licenseodqwmqn.shop
  • 49.13.77.253
malicious
tendencctywop.shop
  • 49.13.77.253
malicious
tesecuuweqo.shop
  • 49.13.77.253
malicious
relaxatinownio.shop
  • 49.13.77.253
malicious
reggwardssdqw.shop
  • 49.13.77.253
malicious
tryyudjasudqo.shop
  • 49.13.77.253
malicious

Threats

PID
Process
Class
Message
6624
RegAsm.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6624
RegAsm.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6624
RegAsm.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6624
RegAsm.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6624
RegAsm.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6624
RegAsm.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6624
RegAsm.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6624
RegAsm.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
6624
RegAsm.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
No debug info