File name:

HPSupportSolutionsFramework-13.0.1.131.exe

Full analysis: https://app.any.run/tasks/6b3edaf8-7ccf-4565-9a96-a2cd5b0a45d1
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: August 25, 2024, 13:48:16
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

00E72C6ACE5E80417ED56B137F4B905B

SHA1:

0BC4AA8F3B176DD5C9B971A96775FB78FB7B427B

SHA256:

D7EA8974909E6F3D1FE55B5806254150BAB4936237F2998BA89F3B1C00FAB1F5

SSDEEP:

393216:T6vPh1BdB07APNAPOAPGcqIl1mEVUdfZAZyMQw:Tup1BdB+APNAPOAPGcqK1mEVSBAZyy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • HPSupportSolutionsFramework-13.0.1.131.exe (PID: 6768)
    • Stealers network behavior

      • HPSupportSolutionsFramework-13.0.1.131.exe (PID: 6768)
    • Actions looks like stealing of personal data

      • HPSupportSolutionsFramework-13.0.1.131.exe (PID: 6768)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • HPSupportSolutionsFramework-13.0.1.131.exe (PID: 6768)
    • Searches for installed software

      • HPSupportSolutionsFramework-13.0.1.131.exe (PID: 6768)
  • INFO

    • Reads the computer name

      • HPSupportSolutionsFramework-13.0.1.131.exe (PID: 6768)
    • Reads the software policy settings

      • HPSupportSolutionsFramework-13.0.1.131.exe (PID: 6768)
    • Checks supported languages

      • HPSupportSolutionsFramework-13.0.1.131.exe (PID: 6768)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:12 23:25:52+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 24064
InitializedDataSize: 375808
UninitializedDataSize: -
EntryPoint: 0x49c2
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.2.78.55519
ProductVersionNumber: 0.2.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: HP Inc.
FileDescription: Realtek High-Definition (HD) Audio Driver
FileVersion: 0.2.78.55519
InternalName: hpsoftpaqwrapper
OriginalFileName: hpsoftpaqwrapper.exe
ProductName: Realtek High-Definition (HD) Audio Driver
ProductVersion: 10.0.91.1
LegalCopyright: Copyright (c) 2023 HP Development Company, LP.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LUMMA hpsupportsolutionsframework-13.0.1.131.exe

Process information

PID
CMD
Path
Indicators
Parent process
6768"C:\Users\admin\AppData\Local\Temp\HPSupportSolutionsFramework-13.0.1.131.exe" C:\Users\admin\AppData\Local\Temp\HPSupportSolutionsFramework-13.0.1.131.exe
explorer.exe
User:
admin
Company:
HP Inc.
Integrity Level:
MEDIUM
Description:
Realtek High-Definition (HD) Audio Driver
Exit code:
0
Version:
0.2.78.55519
Modules
Images
c:\users\admin\appdata\local\temp\hpsupportsolutionsframework-13.0.1.131.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
549
Read events
549
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
28
DNS requests
18
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6532
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6532
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2132
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1128
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6768
HPSupportSolutionsFramework-13.0.1.131.exe
172.67.199.145:443
reagoofydwqioo.shop
CLOUDFLARENET
US
unknown
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2132
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2132
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.46
whitelisted
client.wns.windows.com
  • 40.115.3.253
  • 40.113.110.67
whitelisted
reagoofydwqioo.shop
  • 172.67.199.145
  • 104.21.44.118
unknown
login.live.com
  • 20.190.159.68
  • 20.190.159.73
  • 20.190.159.71
  • 20.190.159.4
  • 40.126.31.71
  • 20.190.159.2
  • 40.126.31.69
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.31
whitelisted

Threats

PID
Process
Class
Message
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
No debug info