File name:

GqHQWNMv.txt

Full analysis: https://app.any.run/tasks/d63691b1-079f-4e63-a582-402d727ca11c
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: November 24, 2024, 11:09:03
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
lumma
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (65265), with CRLF line terminators
MD5:

17917B9AB6492A66D3751C21C4EBB768

SHA1:

CDC619BAC0FD3BEA62FCB5DA052CA6B8380CFA0B

SHA256:

F8278FE32A0916F85BD703AA8975D4E559466EE96A188F68BD2A2816FDBB18A8

SSDEEP:

49152:NuviW4pThmwMmgZGnCFpZXo2p3qjNibnvLXa89D3PQxBPm7aN2rtYYcd0Bke2GfQ:T

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4132)
    • Actions looks like stealing of personal data

      • msiexec.exe (PID: 2796)
    • Steals credentials from Web Browsers

      • msiexec.exe (PID: 2796)
    • LUMMA has been detected (YARA)

      • msiexec.exe (PID: 2796)
  • SUSPICIOUS

    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 4132)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 4132)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 4132)
      • mdnsresponder.exe (PID: 1740)
    • Process drops legitimate windows executable

      • powershell.exe (PID: 4132)
    • The process drops C-runtime libraries

      • powershell.exe (PID: 4132)
    • Uses sleep to delay execution (POWERSHELL)

      • powershell.exe (PID: 4132)
    • Process drops SQLite DLL files

      • powershell.exe (PID: 4132)
      • mdnsresponder.exe (PID: 1740)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 4132)
    • Starts application with an unusual extension

      • mdnsresponder.exe (PID: 1740)
  • INFO

    • Manual execution by a user

      • powershell.exe (PID: 4132)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 396)
    • The process uses the downloaded file

      • powershell.exe (PID: 4132)
    • Checks supported languages

      • mdnsresponder.exe (PID: 1740)
      • more.com (PID: 5316)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 4132)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 4132)
    • Reads the computer name

      • mdnsresponder.exe (PID: 1740)
      • more.com (PID: 5316)
    • Creates files or folders in the user directory

      • mdnsresponder.exe (PID: 1740)
    • Reads the software policy settings

      • msiexec.exe (PID: 2796)
    • Create files in a temporary directory

      • mdnsresponder.exe (PID: 1740)
      • more.com (PID: 5316)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start notepad.exe no specs powershell.exe conhost.exe no specs mdnsresponder.exe more.com no specs conhost.exe no specs #LUMMA msiexec.exe

Process information

PID
CMD
Path
Indicators
Parent process
396"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\GqHQWNMv.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
1740"C:\Users\admin\AppData\Roaming\YrsbtdxL\mdnsresponder.exe" C:\Users\admin\AppData\Roaming\YrsbtdxL\mdnsresponder.exe
powershell.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
iTop Data Recovery Service
Exit code:
1
Version:
4.0.0.168
Modules
Images
c:\users\admin\appdata\roaming\yrsbtdxl\mdnsresponder.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
1760\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2796C:\WINDOWS\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe
more.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\hploo
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4132"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass "C:\Users\admin\Desktop\GqHQWNMv.txt.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4684\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5316C:\WINDOWS\SysWOW64\more.comC:\Windows\SysWOW64\more.commdnsresponder.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
More Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\more.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ulib.dll
Total events
8 690
Read events
8 689
Write events
1
Delete events
0

Modification events

(PID) Process:(4132) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:NetUtilityApp
Value:
C:\Users\admin\AppData\Roaming\YrsbtdxL\mdnsresponder.exe
Executable files
78
Suspicious files
10
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4132powershell.exeC:\Users\admin\AppData\Roaming\YrsbtdxL\HEIC-NET.dllexecutable
MD5:F71EAB315B80F78427311034A6BB46E2
SHA256:4F27E6E32F1DFF1BC6B0F4E79B32A07DA5554844CE4820A7920E5107C67F2F40
4132powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kfqnzkj3.35c.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4132powershell.exeC:\Users\admin\AppData\Roaming\LuLUoTPN.zipcompressed
MD5:336AE4F91BDAAB9FD548A0BB96E85BF3
SHA256:B9068030CEDBF08F1149951AD6AFDDE65025383E3D27E2123ECE23F6363DDE51
4132powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:8C080D077E76C8CDC16108EE5704AB72
SHA256:B062653B421044CCC1E30F63F510BD8D1F9E67C7DF9CBCA728025C16528BD6B7
4132powershell.exeC:\Users\admin\AppData\Roaming\YrsbtdxL\HEIC_SWIG_DLL_v142.dllexecutable
MD5:0EDD60513A12689189309B50261E8979
SHA256:54F9E01DF5A6061A4D84BDC0FC0D263A70F4FA2BAE307146BAE9D00B90226DAB
4132powershell.exeC:\Users\admin\AppData\Roaming\YrsbtdxL\Microsoft.AppCenter.dllexecutable
MD5:DC07B593904DB4B5B6D54DCBBBFA99EF
SHA256:3313F9C5A9788A0C70B7418F81DEC119C7E95D563B316E48B6A1FBA8C94FE7AF
4132powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_h5qlz2ii.0ve.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4132powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF13c14f.TMPbinary
MD5:D040F64E9E7A2BB91ABCA5613424598E
SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670
4132powershell.exeC:\Users\admin\AppData\Roaming\YrsbtdxL\HtmlRenderer.PdfSharp.dllexecutable
MD5:F8730360B74E1FBFD46B6EC8E4209ACC
SHA256:BDDC95E5EED0A68A54FCF2DFA99548642966DFDBF9B91940FF028E1EBF0ACDBD
4132powershell.exeC:\Users\admin\AppData\Roaming\YrsbtdxL\mdnsresponder.exeexecutable
MD5:EC539C4A9C60B3690FBD891E19333362
SHA256:1D60149CE640F4E07BCEEB8940950441025277F1EBA4F501F8AFE558030B34FE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
26
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6068
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6068
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
172.67.193.71:443
https://sturdy-operated.cyou/api
unknown
text
2 b
POST
200
104.21.20.178:443
https://sturdy-operated.cyou/api
unknown
text
17.1 Kb
POST
200
172.67.193.71:443
https://sturdy-operated.cyou/api
unknown
text
15 b
POST
200
104.21.20.178:443
https://sturdy-operated.cyou/api
unknown
text
15 b
POST
200
104.21.20.178:443
https://sturdy-operated.cyou/api
unknown
text
15 b
POST
200
172.67.193.71:443
https://sturdy-operated.cyou/api
unknown
text
15 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6068
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6068
svchost.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6068
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3976
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.74.206
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
sturdy-operated.cyou
  • 104.21.20.178
  • 172.67.193.71
unknown
self.events.data.microsoft.com
  • 13.69.239.77
whitelisted

Threats

No threats detected
No debug info