| File name: | lnstaIIer_x86_patched.exe |
| Full analysis: | https://app.any.run/tasks/e3c0b293-bbf4-4ba9-96f8-6176a86be043 |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | April 29, 2025, 12:35:49 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
| MD5: | 60B4E1B885190679650D67EE61C1001B |
| SHA1: | 137ED46C6C6BF25749A9501DDBB9A5CB83FEAE6D |
| SHA256: | 3C5B807F1F2662333D52AD59FD320624F8AB4D69D140F83015D938AB1A507847 |
| SSDEEP: | 98304:8voHQ5RXi4LThckz9llHYxYdripA3XIgFMPSB69rnMk2:UhCo |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2010:04:10 12:19:23+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 25600 |
| InitializedDataSize: | 432128 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x33e9 |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 135.0.7049.85 |
| ProductVersionNumber: | 135.0.7049.85 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Google LLC |
| FileDescription: | Google Chrome |
| FileVersion: | 135.0.7049.85 |
| InternalName: | chrome_exe |
| LegalCopyright: | Copyright 2025 Google LLC. All rights reserved. |
| OriginalFileName: | chrome.exe |
| ProductName: | Google Chrome |
| ProductVersion: | 135.0.7049.85 |
| CompanyShortName: | |
| ProductShortName: | Chrome |
| LastChange: | 1e112499da812a1dde62101ed601dcb93024aaff-refs/branch-heads/7049@{#1779} |
| OfficialBuild: | 1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 660 | "C:\WINDOWS\System32\cmd.exe" /c copy Neural.tmp Neural.tmp.bat & Neural.tmp.bat | C:\Windows\SysWOW64\cmd.exe | — | lnstaIIer_x86_patched.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 976 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1056 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1184 | findstr /V "EVE" Format | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1324 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2136 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2392 | "C:\Users\admin\Desktop\lnstaIIer_x86_patched.exe" | C:\Users\admin\Desktop\lnstaIIer_x86_patched.exe | — | explorer.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 135.0.7049.85 Modules
| |||||||||||||||
| 2432 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3240 | findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2392 | lnstaIIer_x86_patched.exe | C:\Users\admin\AppData\Local\Temp\Taxi.tmp | binary | |
MD5:2C73AD9657BB4351A56E27D789DA441D | SHA256:533E2513E0C67364E724C27B8429A03BE41A1F4A082BB67623659E1B8CF7D79A | |||
| 2392 | lnstaIIer_x86_patched.exe | C:\Users\admin\AppData\Local\Temp\Neural.tmp | text | |
MD5:1E504DF6035018F01FB2671E63C833B0 | SHA256:947EE3D8EBD9ED9D5EE7B07664771A5B1EB63079E53EB992A7D0F4DD7E3B8BB8 | |||
| 2392 | lnstaIIer_x86_patched.exe | C:\Users\admin\AppData\Local\Temp\Nature.tmp | binary | |
MD5:7BA6F0A4E3077CEF88BEA7655A68F42F | SHA256:D65696D18B24965AE30C486857CFBD60F263AC7BFDCA9BFB8597F5A98B457CFB | |||
| 2392 | lnstaIIer_x86_patched.exe | C:\Users\admin\AppData\Local\Temp\Sporting.tmp | compressed | |
MD5:5AB481C8A234B5AD671C12751F0AB604 | SHA256:B509028644137C107B340BF8F3A2EDC9D9812D73BCC6EB98AD17FFF11782F3BE | |||
| 2392 | lnstaIIer_x86_patched.exe | C:\Users\admin\AppData\Local\Temp\Invitations.tmp | binary | |
MD5:B1F0AE657F0CFFAFF4905A2B89BE0063 | SHA256:0E0AA6C8B70C090EACE0A914242834C5BB4EE9A9D41F9EC5E3309D5CD67870CE | |||
| 2392 | lnstaIIer_x86_patched.exe | C:\Users\admin\AppData\Local\Temp\Customise.tmp | binary | |
MD5:B69A2B08C6B4C0D962A2B0EC80578B8C | SHA256:67145993EFD2E799E8ABFEB970BE15B4C9BA91716F38966C1464C34BC1C4724A | |||
| 660 | cmd.exe | C:\Users\admin\AppData\Local\Temp\Neural.tmp.bat | text | |
MD5:1E504DF6035018F01FB2671E63C833B0 | SHA256:947EE3D8EBD9ED9D5EE7B07664771A5B1EB63079E53EB992A7D0F4DD7E3B8BB8 | |||
| 4696 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Grace | binary | |
MD5:B7580D764E252BA54202A683EC7BA429 | SHA256:9FAF721D71EFFB7C588DEC7C2A98E6A18E5FAA0D9C635FBE7135B45CB7F480D2 | |||
| 4696 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Format | binary | |
MD5:4127B46ECA86BC16EC0E98276683AAF7 | SHA256:1C15C2173EF5DACE1760637659A3E7AD34D24503C4DEC120AE38DAF71385CCFC | |||
| 4696 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Thumbs | binary | |
MD5:CA4B32A209731FED8EB1CD92A8F50293 | SHA256:E16864B8C9669CDFA3A5D3692FDBCC1ECB55FF73F1EF55F48A33DFA31F361B9D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.191:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4228 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
4228 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.48.23.191:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.159.75:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4892 | Mu.com | 149.154.167.99:443 | t.me | Telegram Messenger Inc | GB | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
qyphIBaHSKl.qyphIBaHSKl |
| unknown |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
t.me |
| whitelisted |
eplinko.us |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
4892 | Mu.com | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |
2196 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (changeaie .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (piratetwrath .run) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (liftally .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (quilltayle .live) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nighetwhisper .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (zestmodp .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (salaccgfa .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (starofliught .top) |