File name:

Lumma.zip

Full analysis: https://app.any.run/tasks/d61d67d7-2728-4952-86a8-8136375d3c37
Verdict: Malicious activity
Analysis date: October 29, 2023, 05:24:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

B07F5045C85F1E546645AE049E78F5DB

SHA1:

CB4F4BA7E622E253ABB637065C80544B4320F7F6

SHA256:

E7AC75DD061665BDB28BDC5A890877ECAF38388AB56DBDE3922898D4A7D1053E

SSDEEP:

786432:NgLcTr3A15h5X5eGA/S5xAaodcLCWDDRPF7H60m80bfbSIEn5vfo2W6OxvZ:uLqr3A1z5AcKBetBa0m80pE5vVOxx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • dbg32x.exe (PID: 1848)
      • 45f00d2a6b59b6669c108b460fccde6a.bin (PID: 316)
      • 45f00d2a6b59b6669c108b460fccde6a.bin (PID: 3456)
      • dbg32x.exe (PID: 3820)
    • Loads dropped or rewritten executable

      • dbg32x.exe (PID: 1848)
      • dbg32x.exe (PID: 3820)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 1248)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 548)
      • cmd.exe (PID: 1868)
    • Drops a system driver (possible attempt to evade defenses)

      • WinRAR.exe (PID: 1248)
    • Starts CMD.EXE for commands execution

      • runas.exe (PID: 2204)
      • runas.exe (PID: 560)
    • Starts application with an unusual extension

      • dbg32x.exe (PID: 1848)
      • dbg32x.exe (PID: 3820)
    • Reads the Internet Settings

      • dbg32x.exe (PID: 1848)
    • Application launched itself

      • dbg32x.exe (PID: 1848)
  • INFO

    • Manual execution by a user

      • WinRAR.exe (PID: 1248)
      • cmd.exe (PID: 3800)
      • cmd.exe (PID: 568)
    • Reads the computer name

      • wmpnscfg.exe (PID: 2368)
      • dbg32x.exe (PID: 1848)
      • dbg32x.exe (PID: 3820)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2368)
      • dbg32x.exe (PID: 1848)
      • dbg32x.exe (PID: 3820)
      • 45f00d2a6b59b6669c108b460fccde6a.bin (PID: 3456)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 2368)
      • dbg32x.exe (PID: 1848)
      • dbg32x.exe (PID: 3820)
    • Create files in a temporary directory

      • dbg32x.exe (PID: 1848)
      • dbg32x.exe (PID: 3820)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1248)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2023:06:23 01:03:14
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Lumma/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
16
Malicious processes
3
Suspicious processes
3

Behavior graph

Click at the process to see the details
start rundll32.exe no specs winrar.exe no specs searchprotocolhost.exe no specs cmd.exe runas.exe no specs cmd.exe no specs sc.exe no specs runas.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs dbg32x.exe no specs 45f00d2a6b59b6669c108b460fccde6a.bin no specs dbg32x.exe 45f00d2a6b59b6669c108b460fccde6a.bin no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
316"C:\Users\admin\Desktop\Lumma\45f00d2a6b59b6669c108b460fccde6a.bin"C:\Users\admin\Desktop\Lumma\45f00d2a6b59b6669c108b460fccde6a.bindbg32x.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\lumma\45f00d2a6b59b6669c108b460fccde6a.bin
c:\windows\system32\ntdll.dll
548cmd /c sc create HideTitan binPath= C:\Users\admin\Desktop\soft\HideTitan\x32\HideTitan.sys type= kernelC:\Windows\System32\cmd.exerunas.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
560runas /user:administrator /savecred "cmd /c sc start HideTitan"C:\Windows\System32\runas.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Run As Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\runas.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\credui.dll
568C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\soft\x32dbg.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
844"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1248"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Lumma.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1280sc create HideTitan binPath= C:\Users\admin\Desktop\soft\HideTitan\x32\HideTitan.sys type= kernelC:\Windows\System32\sc.execmd.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1848Xdbg\x32\dbg32x.exe C:\Users\admin\Desktop\soft\Xdbg\x32\dbg32x.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
x64dbg
Exit code:
0
Version:
0.0.2.5
Modules
Images
c:\users\admin\desktop\soft\xdbg\x32\dbg32x.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\desktop\soft\xdbg\x32\x32bridge.dll
c:\windows\system32\advapi32.dll
1868cmd /c sc start HideTitanC:\Windows\System32\cmd.exerunas.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\winbrand.dll
2204runas /user:administrator /savecred "cmd /c sc create HideTitan binPath= C:\Users\admin\Desktop\soft\HideTitan\x32\HideTitan.sys type= kernel"C:\Windows\System32\runas.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Run As Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
Total events
1 887
Read events
1 856
Write events
28
Delete events
3

Modification events

(PID) Process:(2368) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{51131184-60BC-4A38-BAB0-97B33B9589C3}\{D716EF08-2EFC-4F4A-9F8A-D449D2FAE55F}
Operation:delete keyName:(default)
Value:
(PID) Process:(2368) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{51131184-60BC-4A38-BAB0-97B33B9589C3}
Operation:delete keyName:(default)
Value:
(PID) Process:(2368) wmpnscfg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{B44CBD19-CDBF-45A1-929D-29909BC8E041}
Operation:delete keyName:(default)
Value:
(PID) Process:(1248) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(1248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(1248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1248) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
99
Suspicious files
3
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7573\Lumma\c2conftext
MD5:4C55078DA7F0D632B0AF29DFA23E0DB7
SHA256:533A6854EFE4F57824AD9E8154D448D22EAB66AF085E377E190B648F2363ECEF
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7765\soft\x64dbg.battext
MD5:AF47A9EC391EDFAC880052942215DF80
SHA256:ADB8DDBFB263EB3E23FC5DEE0867946FA2D150DB26F3BBB4EC61A390324A647D
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7573\Lumma\45f00d2a6b59b6669c108b460fccde6a.binexecutable
MD5:45F00D2A6B59B6669C108B460FCCDE6A
SHA256:B57CC512C2E7990AFD0E29FBFCFA9D53DF8AD37E08E8C13BAB2D9AAFCF2FA34E
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7765\soft\Xdbg\x64\LLVMDemangle.dllexecutable
MD5:1228E59DF447F4E6476546AE24638071
SHA256:8DE391F11CEEAFA007BADF71B62560368F8C71623486FF1C2E4C5373FE482834
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7765\soft\Xdbg\x64\XEDParse.dllexecutable
MD5:E82079A897FD57748FC81E77B5756E65
SHA256:1D339E41CA9D5337B410FEEC1CA808A7AD8B0AF2CB6827CFE581CACBE04BA376
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7765\soft\Xdbg\x64\x64bridge.dllexecutable
MD5:750F383C351F4C8F4D1FDD74962871AF
SHA256:1800D906E15687F7A54F0BBE2FBB83AFE41C138D407F4511F7A098BED4531C7D
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7765\soft\Xdbg\x64\plugins\TitanHide.dp64executable
MD5:A1CABC02B78CFC7F45CE4584D8EA68E0
SHA256:1BC140B86D655905F3034B4A25CDA61E330B1CF5DC31853A7E40E5A1C39842EA
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7765\soft\Xdbg\x64\libeay32.dllexecutable
MD5:17B7B7A84812EC0D340BF64C84703DD4
SHA256:19396B3FD3458ACE580054156B2F257F1687907427DEF44321F5E989AEF4B14A
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7765\soft\Xdbg\x64\dbghelp.dllexecutable
MD5:E9F0405AA557D9DB4352C3473122905F
SHA256:507262CB88B8EBC64A79451C49CD3B59EAB97F4B81D265B51D6CCBA487BA8301
1248WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1248.7765\soft\Xdbg\x64\x64gui.dllexecutable
MD5:748EFB555098800515809F3D787BC305
SHA256:17B3BCFE067BFEB8D382ED9B3B159E1E6012F474AE4819672E4037090D8CDE39
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
239.255.255.250:1900
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info