File name:

✻P͎A͎$͎$͎ᵏєү--6428_♦Ł@Ťє𝓼𝐭-►𝕤3𝔱υק#&$!!!.zip

Full analysis: https://app.any.run/tasks/6a626eca-0383-4932-989a-5302da155da5
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: May 10, 2025, 22:35:31
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
autoit
stealer
lumma
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

2FF5CE06C306B5502BB90E003AA868D2

SHA1:

8407E95A0F4D049B38AA92C91404BCFEFE5AFAEB

SHA256:

082A8CAB941D512AB282DFCF44F8783F0866E14264F0E9CD1939CF93FC54255C

SSDEEP:

49152:VJna0sw47VleWlHRDad0uWjlxaYagpsKVDi5oLyifSExGSz2eFjNLNYuTP+A+TDm:VJnhsr7VlJHxad0uSx3a7U0A5S6XSgZB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • setup.exe (PID: 7880)
    • LUMMA mutex has been found

      • Warriors.com (PID: 6712)
    • Steals credentials from Web Browsers

      • Warriors.com (PID: 6712)
    • Actions looks like stealing of personal data

      • Warriors.com (PID: 6712)
  • SUSPICIOUS

    • Application launched itself

      • WinRAR.exe (PID: 7416)
      • WinRAR.exe (PID: 7148)
      • cmd.exe (PID: 7932)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7148)
      • WinRAR.exe (PID: 7416)
      • WinRAR.exe (PID: 7816)
      • setup.exe (PID: 7880)
    • Executing commands from a ".bat" file

      • setup.exe (PID: 7880)
    • Get information on the list of running processes

      • cmd.exe (PID: 7932)
    • Starts CMD.EXE for commands execution

      • setup.exe (PID: 7880)
      • cmd.exe (PID: 7932)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7932)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 7932)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7932)
    • The executable file from the user directory is run by the CMD process

      • Warriors.com (PID: 6712)
    • There is functionality for taking screenshot (YARA)

      • setup.exe (PID: 7880)
    • Searches for installed software

      • Warriors.com (PID: 6712)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7816)
    • Checks supported languages

      • setup.exe (PID: 7880)
      • extrac32.exe (PID: 6728)
      • Warriors.com (PID: 6712)
    • Create files in a temporary directory

      • setup.exe (PID: 7880)
      • extrac32.exe (PID: 6728)
    • Reads the computer name

      • setup.exe (PID: 7880)
      • extrac32.exe (PID: 6728)
      • Warriors.com (PID: 6712)
    • Process checks computer location settings

      • setup.exe (PID: 7880)
    • Creates a new folder

      • cmd.exe (PID: 8176)
    • Reads mouse settings

      • Warriors.com (PID: 6712)
    • Reads the software policy settings

      • Warriors.com (PID: 6712)
      • slui.exe (PID: 7360)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0800
ZipCompression: Deflated
ZipModifyDate: 2025:05:11 00:55:32
ZipCRC: 0xc8cb374c
ZipCompressedSize: 1183114
ZipUncompressedSize: 1182929
ZipFileName: 𝗗𝗢𝗪𝗡𝗟@𝗢𝗔𝗗#$_𝗖𝗢𝗠𝗣𝗟𝗘𝗧𝗘❏⤖𝗦𝗘𝗧3𝗨𝗣✷𝗖𝗢2𝗗𝗘#$!.7z
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
20
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe winrar.exe no specs winrar.exe setup.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs extrac32.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs #LUMMA warriors.com choice.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
660cmd /c copy /b 215815\Warriors.com + Animals + Terry + Facility + Detect + Thermal + Studies + Joke + Deutsche + Concerns 215815\Warriors.comC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4300findstr /V "dj" Pushed C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
6048C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6192choice /d y /t 5C:\Windows\SysWOW64\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
6476cmd /c copy /b ..\Productions.vsdx + ..\English.vsdx + ..\Gis.vsdx + ..\Ability.vsdx + ..\Cats.vsdx + ..\Thru.vsdx + ..\Portland.vsdx + ..\Fiction.vsdx g C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6712Warriors.com g C:\Users\admin\AppData\Local\Temp\215815\Warriors.com
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Version:
3, 3, 15, 5
Modules
Images
c:\users\admin\appdata\local\temp\215815\warriors.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
6728extrac32 /Y /E Enclosed.vsdxC:\Windows\SysWOW64\extrac32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® CAB File Extract Utility
Exit code:
0
Version:
5.00 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\extrac32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
7148"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\✻P͎A͎$͎$͎ᵏєү--6428_♦Ł@Ťє𝓼𝐭-►𝕤3𝔱υק#&$!!!.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7328C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7360"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
7 086
Read events
7 061
Write events
25
Delete events
0

Modification events

(PID) Process:(7148) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7148) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7148) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7148) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\✻P͎A͎$͎$͎ᵏєү--6428_♦Ł@Ťє𝓼𝐭-►𝕤3𝔱υק#&$!!!.zip
(PID) Process:(7148) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7148) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7148) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7148) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7416) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7416) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
Executable files
1
Suspicious files
22
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
7880setup.exeC:\Users\admin\AppData\Local\Temp\Ul.vsdxtext
MD5:77CDF4B521683D0917BD9B78D9AF7DD9
SHA256:EAB32B59C501FA143A93E166B23185ABF6EA952E5F390354B3D4002D1FE1947B
7148WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa7148.35229\𝗗𝗢𝗪𝗡𝗟@𝗢𝗔𝗗#$_𝗖𝗢𝗠𝗣𝗟𝗘𝗧𝗘❏⤖𝗦𝗘𝗧3𝗨𝗣✷𝗖𝗢2𝗗𝗘#$!.7zcompressed
MD5:BBA670858BBBB21FCFB3B7DBD3F5CF8E
SHA256:EF771658CE8AD2E300F62E3812E469937223B98BEE6DFF13663045073DB6BCE0
7880setup.exeC:\Users\admin\AppData\Local\Temp\Fiction.vsdxbinary
MD5:FC4277C3DD4C3DBF1D0330AE0F3ADF27
SHA256:189F3B1FCE47DDD1A4AF4123DB002C6E99AA83B6E84960DF6EBF2B8A2DCEFA09
7416WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb7416.36325\SETUP.zipcompressed
MD5:C28F8298B2D98937516B707324A05645
SHA256:E9B4323C25E57FFCC40BDE2314A9939D7E20FA03F2AEE006AE435C7359937DF3
6728extrac32.exeC:\Users\admin\AppData\Local\Temp\Terrybinary
MD5:2EA7C072710F41D6523AC7CF17682DA3
SHA256:88245217319DD58F7EB2296562DF97F3E592E52C94F88C1DA58C88931D9F9639
6728extrac32.exeC:\Users\admin\AppData\Local\Temp\Thermalbinary
MD5:3EA0C22BB786E6D9A05AE7025648EA6A
SHA256:C73E72EF21E65B26C1FE1D2943091322C94A948416A423F21296EC3B1DDA7F75
6728extrac32.exeC:\Users\admin\AppData\Local\Temp\Facilitybinary
MD5:6F1211E99F2B43F77C3A45B305558E36
SHA256:1EE4B5B0C738955633EBA86A1D970CA32E2FC3EC4F0660956F6A8D4D6B7AA861
6728extrac32.exeC:\Users\admin\AppData\Local\Temp\Studiesbinary
MD5:5F3EB02089D7650A641F7785B7212964
SHA256:FBF75F74D299AB0941E89A3984C7B234C3AB64789B62FD62E6DF736CB1C5165B
6728extrac32.exeC:\Users\admin\AppData\Local\Temp\Pushedbinary
MD5:08B598A9F3EAE5313090CB29F247FA0D
SHA256:B0FC7EAAC8F75BF08B16E318E1B85C9B9DC07D01DEE98CAB1FDFA7618C146852
7880setup.exeC:\Users\admin\AppData\Local\Temp\Productions.vsdxbinary
MD5:BAD93116B7517329ADF5983F699AF283
SHA256:AA76F40285D1FE78740210A999EDB4C76F5E359E8149091A331C7E28CDA1C83F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
25
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.48.23.150:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1660
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1660
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
23.48.23.150:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1660
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.150
  • 23.48.23.194
  • 23.48.23.141
  • 23.48.23.140
  • 23.48.23.153
  • 23.48.23.147
  • 23.48.23.146
  • 23.48.23.139
  • 23.48.23.193
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 142.250.186.46
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.73
  • 40.126.31.69
  • 20.190.159.4
  • 20.190.159.131
  • 40.126.31.71
  • 20.190.159.128
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
kMocBwQIQuslkcFlACcjh.kMocBwQIQuslkcFlACcjh
unknown
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info