File name:

Soft.exe

Full analysis: https://app.any.run/tasks/80db2f7e-2b47-4d6a-87e9-82e0a8657938
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: August 25, 2024, 16:07:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
alfac2
lumma
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

99FC075EAA83E39A2D73940A0356FEA5

SHA1:

0EA7477D1787CB46904C09EDA927C6EED81DA4D4

SHA256:

F0CB77F2E02D25D0343BC74D52837B65C879D1A9248312D5F422C0440BC5B04A

SSDEEP:

98304:g+HxITpOiixhWkJBOtGEm2mpaRKsdJaw7amKrnW98n34Ru+mJdjrnTp1SfHaGGCW:mM5ye8pGbKy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ALFAC2 has been detected (YARA)

      • Soft.exe (PID: 6672)
    • Stealers network behavior

      • BitLockerToGo.exe (PID: 7144)
    • LUMMA has been detected (SURICATA)

      • BitLockerToGo.exe (PID: 7144)
    • Actions looks like stealing of personal data

      • BitLockerToGo.exe (PID: 7144)
    • LUMMA has been detected (YARA)

      • BitLockerToGo.exe (PID: 7144)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • Soft.exe (PID: 6672)
    • There is functionality for communication over UDP network (YARA)

      • Soft.exe (PID: 6672)
    • Searches for installed software

      • BitLockerToGo.exe (PID: 7144)
  • INFO

    • Checks supported languages

      • Soft.exe (PID: 6672)
      • BitLockerToGo.exe (PID: 7144)
    • Reads the computer name

      • Soft.exe (PID: 6672)
      • BitLockerToGo.exe (PID: 7144)
    • Reads the software policy settings

      • BitLockerToGo.exe (PID: 7144)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Lumma

(PID) Process(7144) BitLockerToGo.exe
C2 (9)deicedosmzj.shop
southedhiscuso.shop
cagedwifedsozm.shop
consciousourwi.shop
interactiedovspm.shop
charecteristicdxp.shop
largerryskwhq.shop
potentioallykeos.shop
weiggheticulop.shop
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 3
CodeSize: 23056384
InitializedDataSize: 3996160
UninitializedDataSize: -
EntryPoint: 0x7a060
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 12.4.3.1
ProductVersionNumber: 12.4.3.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Apple Inc.
FileDescription: Soft Installer
FileVersion: 12.4.3.1
LegalCopyright: Apple Inc. All Rights Reserved.
InternalName: SoftSetup
OriginalFileName: Soft.exe
ProductName: Soft
ProductVersion: 12.4.3.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT soft.exe #LUMMA bitlockertogo.exe soft.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6624"C:\Users\admin\AppData\Local\Temp\Soft.exe" C:\Users\admin\AppData\Local\Temp\Soft.exeexplorer.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
MEDIUM
Description:
Soft Installer
Exit code:
3221226540
Version:
12.4.3.1
Modules
Images
c:\users\admin\appdata\local\temp\soft.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6672"C:\Users\admin\AppData\Local\Temp\Soft.exe" C:\Users\admin\AppData\Local\Temp\Soft.exe
explorer.exe
User:
admin
Company:
Apple Inc.
Integrity Level:
HIGH
Description:
Soft Installer
Exit code:
666
Version:
12.4.3.1
Modules
Images
c:\users\admin\appdata\local\temp\soft.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
7144"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
Soft.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
BitLocker To Go Reader
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\bitlockerdiscoveryvolumecontents\bitlockertogo.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
Lumma
(PID) Process(7144) BitLockerToGo.exe
C2 (9)deicedosmzj.shop
southedhiscuso.shop
cagedwifedsozm.shop
consciousourwi.shop
interactiedovspm.shop
charecteristicdxp.shop
largerryskwhq.shop
potentioallykeos.shop
weiggheticulop.shop
Total events
2 225
Read events
1 979
Write events
246
Delete events
0

Modification events

(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-462
Value:
Afghanistan Standard Time
(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-461
Value:
Afghanistan Daylight Time
(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-222
Value:
Alaskan Standard Time
(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-221
Value:
Alaskan Daylight Time
(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-2392
Value:
Aleutian Standard Time
(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-2391
Value:
Aleutian Daylight Time
(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-2162
Value:
Altai Standard Time
(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-2161
Value:
Altai Daylight Time
(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-392
Value:
Arab Standard Time
(PID) Process:(6672) Soft.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:C:\WINDOWS\system32\,@tzres.dll,-391
Value:
Arab Daylight Time
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
26
DNS requests
14
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4292
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6396
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6396
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:138
whitelisted
5136
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3540
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7144
BitLockerToGo.exe
188.114.96.3:443
largerryskwhq.shop
CLOUDFLARENET
NL
unknown
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6396
SIHClient.exe
40.68.123.157:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6396
SIHClient.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
unknown
6396
SIHClient.exe
20.3.187.198:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.238
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
largerryskwhq.shop
  • 188.114.96.3
  • 188.114.97.3
unknown
client.wns.windows.com
  • 40.113.110.67
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.0
  • 40.126.31.67
  • 40.126.31.73
  • 20.190.159.23
  • 20.190.159.71
  • 20.190.159.68
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.48
whitelisted

Threats

PID
Process
Class
Message
7144
BitLockerToGo.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
No debug info