File name:

setup.exe

Full analysis: https://app.any.run/tasks/bec4264b-85b0-4b22-a08e-e53209101eaf
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: May 10, 2025, 23:51:58
OS: Windows 11 Professional (build: 22000, 64 bit)
Tags:
autoit
stealer
lumma
autoit-loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

CA3E492EBD940233FFF9FC4E0E76A891

SHA1:

4F31FD884013868B6F32EB26DF365A7CE872918E

SHA256:

03B139C2D7EB566155C820059DD90FE815F813E5644BA8199BC4F01B4FA921AC

SSDEEP:

49152:WS/4cXuY4UNEepwW7alYrvFPUgyQJa2FWO/rujfVDbdhx82k/SjUW/KAKgaIzgPN:z4SLalYDFPUgyrkB/uRh8Sj1KJgaIzuH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • setup.exe (PID: 1616)
    • LUMMA mutex has been found

      • Warriors.com (PID: 3028)
    • Steals credentials from Web Browsers

      • Warriors.com (PID: 3028)
    • Actions looks like stealing of personal data

      • Warriors.com (PID: 3028)
    • AutoIt loader has been detected (YARA)

      • Warriors.com (PID: 3028)
  • SUSPICIOUS

    • Reads the Internet Settings

      • setup.exe (PID: 1616)
      • Warriors.com (PID: 3028)
    • Starts CMD.EXE for commands execution

      • setup.exe (PID: 1616)
      • cmd.exe (PID: 3884)
    • Reads security settings of Internet Explorer

      • setup.exe (PID: 1616)
    • Get information on the list of running processes

      • cmd.exe (PID: 3884)
    • Application launched itself

      • cmd.exe (PID: 3884)
    • Executing commands from a ".bat" file

      • setup.exe (PID: 1616)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 3884)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 3884)
    • Starts application with an unusual extension

      • cmd.exe (PID: 3884)
    • The executable file from the user directory is run by the CMD process

      • Warriors.com (PID: 3028)
    • Reads settings of System Certificates

      • Warriors.com (PID: 3028)
    • Searches for installed software

      • Warriors.com (PID: 3028)
    • There is functionality for taking screenshot (YARA)

      • setup.exe (PID: 1616)
      • Warriors.com (PID: 3028)
  • INFO

    • Create files in a temporary directory

      • setup.exe (PID: 1616)
      • extrac32.exe (PID: 5176)
    • Checks supported languages

      • setup.exe (PID: 1616)
      • extrac32.exe (PID: 5176)
      • Warriors.com (PID: 3028)
    • Reads the computer name

      • setup.exe (PID: 1616)
      • extrac32.exe (PID: 5176)
      • Warriors.com (PID: 3028)
    • Creates a new folder

      • cmd.exe (PID: 1052)
    • Reads mouse settings

      • Warriors.com (PID: 3028)
    • Reads the machine GUID from the registry

      • Warriors.com (PID: 3028)
    • Reads the software policy settings

      • Warriors.com (PID: 3028)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:04:10 12:19:23+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 25600
InitializedDataSize: 431104
UninitializedDataSize: 16896
EntryPoint: 0x33e9
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
114
Monitored processes
14
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start setup.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs extrac32.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs #LUMMA warriors.com choice.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1052cmd /c md 215815C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
1316cmd /c copy /b ..\Productions.vsdx + ..\English.vsdx + ..\Gis.vsdx + ..\Ability.vsdx + ..\Cats.vsdx + ..\Thru.vsdx + ..\Portland.vsdx + ..\Fiction.vsdx g C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
1428tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
1616"C:\Users\admin\Desktop\setup.exe" C:\Users\admin\Desktop\setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
2588\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
3028Warriors.com g C:\Users\admin\AppData\Local\Temp\215815\Warriors.com
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Version:
3, 3, 15, 5
Modules
Images
c:\users\admin\appdata\local\temp\215815\warriors.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
3772findstr "bdservicehost SophosHealth AvastUI AVGUI nsWscSvc ekrn" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.22000.653 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
3884"C:\Windows\System32\CMd.eXe" /c copy Ul.vsdx Ul.vsdx.bat & Ul.vsdx.batC:\Windows\SysWOW64\cmd.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
4288findstr /I "opssvc wrsa" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.22000.653 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
4480tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
Total events
6 529
Read events
6 521
Write events
8
Delete events
0

Modification events

(PID) Process:(1616) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1616) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1616) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1616) setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
20
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
1616setup.exeC:\Users\admin\AppData\Local\Temp\Ul.vsdxtext
MD5:77CDF4B521683D0917BD9B78D9AF7DD9
SHA256:EAB32B59C501FA143A93E166B23185ABF6EA952E5F390354B3D4002D1FE1947B
1616setup.exeC:\Users\admin\AppData\Local\Temp\Fiction.vsdxbinary
MD5:FC4277C3DD4C3DBF1D0330AE0F3ADF27
SHA256:189F3B1FCE47DDD1A4AF4123DB002C6E99AA83B6E84960DF6EBF2B8A2DCEFA09
1616setup.exeC:\Users\admin\AppData\Local\Temp\English.vsdxbinary
MD5:A84506E6303CF868C06719AC260922A6
SHA256:12C424C6BB0DCE749CCE178E0F6042EE553F67AF8EEF6E30F6AAA0638B3321E0
1616setup.exeC:\Users\admin\AppData\Local\Temp\Productions.vsdxbinary
MD5:BAD93116B7517329ADF5983F699AF283
SHA256:AA76F40285D1FE78740210A999EDB4C76F5E359E8149091A331C7E28CDA1C83F
1616setup.exeC:\Users\admin\AppData\Local\Temp\Ability.vsdxbinary
MD5:F63E79DAC28BBEB0EE41082B7CC58F09
SHA256:E557C93BF020A2C31C159489E30453B5560955D46A13144B2746A6FEB5180279
1616setup.exeC:\Users\admin\AppData\Local\Temp\Portland.vsdxbinary
MD5:486E5F1262784019F4F3505C38A584D0
SHA256:FF628E89823F2E8C0724446D19C2274A7C8E320728B2CF451B08FD2BBC674038
5176extrac32.exeC:\Users\admin\AppData\Local\Temp\Concernsbinary
MD5:78168E40CB1452CF834DD1137593025B
SHA256:1D7E086F1425BB5981B119B93545E28ADAA16D7F9C735654B272F2C7D87E06DB
1616setup.exeC:\Users\admin\AppData\Local\Temp\Enclosed.vsdxcompressed
MD5:62F5433E864A092382778DB50D695B24
SHA256:1EEBA50572B8211F8D0093DDE7AD0B50212DFBADF25DACEB7155835BA5487846
1616setup.exeC:\Users\admin\AppData\Local\Temp\Gis.vsdxbinary
MD5:775B0FC0B8809B371EB9AE81C918F303
SHA256:09EBA05368CEEB05C3A50D0D2AC6739974D95846071EC773626DF0896537846C
5176extrac32.exeC:\Users\admin\AppData\Local\Temp\Facilitybinary
MD5:6F1211E99F2B43F77C3A45B305558E36
SHA256:1EE4B5B0C738955633EBA86A1D970CA32E2FC3EC4F0660956F6A8D4D6B7AA861
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
20
DNS requests
11
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1352
svchost.exe
GET
200
88.221.110.216:80
http://www.msftconnecttest.com/connecttest.txt
unknown
whitelisted
2768
svchost.exe
GET
200
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?4c1c53e3976db8c9
unknown
whitelisted
2768
svchost.exe
GET
200
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?98835d2fbe5f2dfa
unknown
whitelisted
3640
svchost.exe
GET
200
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e9f723a4a1e59b1b
unknown
whitelisted
2768
svchost.exe
GET
200
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?0cde1ba27ffa6121
unknown
whitelisted
2768
svchost.exe
GET
200
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e8295883656f7dad
unknown
whitelisted
POST
200
104.21.61.66:443
https://aigjmr.digital/xaf
unknown
binary
10.7 Kb
unknown
POST
200
20.190.160.67:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
POST
200
172.67.206.243:443
https://aigjmr.digital/xaf
unknown
binary
70 b
unknown
POST
200
20.190.160.67:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1352
svchost.exe
88.221.110.216:80
Akamai International B.V.
DE
unknown
3640
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3640
svchost.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
whitelisted
3528
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5268
smartscreen.exe
98.64.238.3:443
checkappexec.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3028
Warriors.com
104.21.61.66:443
aigjmr.digital
CLOUDFLARENET
unknown
3952
svchost.exe
239.255.255.250:1900
whitelisted
2336
svchost.exe
2.16.185.191:443
fs.microsoft.com
AKAMAI-AS
DE
whitelisted
2768
svchost.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
whitelisted
2988
OfficeClickToRun.exe
40.79.141.153:443
self.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
login.live.com
  • 40.126.31.129
  • 20.190.159.68
  • 40.126.31.130
  • 20.190.159.23
  • 20.190.159.64
  • 20.190.159.73
  • 20.190.159.129
  • 40.126.31.128
  • 20.190.159.131
  • 40.126.31.3
  • 40.126.31.131
  • 20.190.159.4
whitelisted
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
checkappexec.microsoft.com
  • 98.64.238.3
whitelisted
kMocBwQIQuslkcFlACcjh.kMocBwQIQuslkcFlACcjh
unknown
aigjmr.digital
  • 104.21.61.66
  • 172.67.206.243
unknown
fs.microsoft.com
  • 2.16.185.191
whitelisted
self.events.data.microsoft.com
  • 40.79.141.153
whitelisted

Threats

PID
Process
Class
Message
1352
svchost.exe
Misc activity
ET INFO Microsoft Connection Test
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
No debug info