File name: | lnstaII.exe |
Full analysis: | https://app.any.run/tasks/11104520-ffc9-43a1-a665-af242933ebdb |
Verdict: | Malicious activity |
Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
Analysis date: | April 29, 2025, 02:13:50 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections |
MD5: | E073F51731466D9369C908FB1271B415 |
SHA1: | 8D3C67A4136F3F4CC0B86DDEB0DF5AFAF37A24D6 |
SHA256: | 44F3FCAF50C792E553ED637729EEE34E859ED0ADD6DFFEE072A4C91F3B6E193A |
SSDEEP: | 98304:6+QqZ8fZKS8zAPxjG9RpuYrL/t/7ietyw+69crPWoSK3fokvCxsL5jFTtHVz5X6a:Tdwe8kUmnpfT+eQK4YuVtFHUjX |
.exe | | | Inno Setup installer (39.4) |
---|---|---|
.exe | | | Win32 EXE PECompact compressed (generic) (14.9) |
.exe | | | Win32 Executable (generic) (1.6) |
.exe | | | Win16/32 Executable Delphi generic (0.7) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2020:09:13 09:00:51+00:00 |
ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
PEType: | PE32 |
LinkerVersion: | 2.25 |
CodeSize: | 741376 |
InitializedDataSize: | 80896 |
UninitializedDataSize: | - |
EntryPoint: | 0xb5eec |
OSVersion: | 6.1 |
ImageVersion: | 6 |
SubsystemVersion: | 6.1 |
Subsystem: | Windows GUI |
FileVersionNumber: | 2.0.1.1 |
ProductVersionNumber: | 2.0.1.1 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Neutral |
CharacterSet: | Unicode |
Comments: | This installation was built with Inno Setup. |
CompanyName: | Seiko Epson Corporation |
FileDescription: | EpsonNet Config |
FileVersion: | 2.0.1.1 |
LegalCopyright: | ENConfig |
OriginalFileName: | ENConfig.exe |
ProductName: | ENConfig |
ProductVersion: | 2.0.1.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1532 | "C:\Users\admin\AppData\Local\Temp\is-S2GUQ.tmp\lnstaII.tmp" /SL5="$80270,13930909,823296,C:\Users\admin\AppData\Local\Temp\lnstaII.exe" | C:\Users\admin\AppData\Local\Temp\is-S2GUQ.tmp\lnstaII.tmp | lnstaII.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 1 Modules
| |||||||||||||||
4608 | "C:\Users\admin\AppData\Roaming\{9026D7E2-C04A-4A5C-830D-5C78CFA216E8}\ENConfig.exe" | C:\Users\admin\AppData\Roaming\{9026D7E2-C04A-4A5C-830D-5C78CFA216E8}\ENConfig.exe | lnstaII.tmp | ||||||||||||
User: admin Company: Seiko Epson Corporation Integrity Level: MEDIUM Description: EpsonNet Config Version: 4, 9, 3, 2100 Modules
| |||||||||||||||
5008 | "C:\Users\admin\AppData\Local\Temp\is-JUU40.tmp\lnstaII.tmp" /SL5="$90270,13930909,823296,C:\Users\admin\AppData\Local\Temp\lnstaII.exe" /VERYSILENT | C:\Users\admin\AppData\Local\Temp\is-JUU40.tmp\lnstaII.tmp | lnstaII.exe | ||||||||||||
User: admin Company: Seiko Epson Corporation Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
5176 | "C:\Users\admin\AppData\Local\Temp\lnstaII.exe" | C:\Users\admin\AppData\Local\Temp\lnstaII.exe | explorer.exe | ||||||||||||
User: admin Company: Seiko Epson Corporation Integrity Level: MEDIUM Description: EpsonNet Config Exit code: 1 Version: 2.0.1.1 Modules
| |||||||||||||||
5204 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6872 | "C:\Users\admin\AppData\Local\Temp\lnstaII.exe" /VERYSILENT | C:\Users\admin\AppData\Local\Temp\lnstaII.exe | lnstaII.tmp | ||||||||||||
User: admin Company: Seiko Epson Corporation Integrity Level: MEDIUM Description: EpsonNet Config Exit code: 0 Version: 2.0.1.1 Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
1532 | lnstaII.tmp | C:\Users\admin\AppData\Local\Temp\is-2H3R6.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
5008 | lnstaII.tmp | C:\Users\admin\AppData\Local\Temp\is-627KS.tmp\_isetup\_isdecmp.dll | executable | |
MD5:077CB4461A2767383B317EB0C50F5F13 | SHA256:8287D0E287A66EE78537C8D1D98E426562B95C50F569B92CEA9CE36A9FA57E64 | |||
5176 | lnstaII.exe | C:\Users\admin\AppData\Local\Temp\is-S2GUQ.tmp\lnstaII.tmp | executable | |
MD5:CDC8306E8553022B16582A1B9C5665CC | SHA256:8C167745BB095F4D5CD027F63D45C6602E02884EA8199B799C4B31703DB279B6 | |||
5008 | lnstaII.tmp | C:\Users\admin\AppData\Local\Temp\is-627KS.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
5008 | lnstaII.tmp | C:\Users\admin\AppData\Roaming\{9026D7E2-C04A-4A5C-830D-5C78CFA216E8}\dynamiclinkui.dll | executable | |
MD5:1E8030AA264522F0D9B4CABD6787807F | SHA256:0B31C371CA1247A8D5451752D17DB277FA3C73A2D85FE0C6ECBB817A3A9A7CC5 | |||
5008 | lnstaII.tmp | C:\Users\admin\AppData\Roaming\{9026D7E2-C04A-4A5C-830D-5C78CFA216E8}\is-MPLJS.tmp | executable | |
MD5:AE4A03A70AC76E06B414F2DF064DDE25 | SHA256:4920A82964D82E0895FA851BA391F9766E01852B56CB6BEA0D25071A5C232AA9 | |||
5008 | lnstaII.tmp | C:\Users\admin\AppData\Roaming\{9026D7E2-C04A-4A5C-830D-5C78CFA216E8}\ConcurrencyCheck.dll | executable | |
MD5:AE4A03A70AC76E06B414F2DF064DDE25 | SHA256:4920A82964D82E0895FA851BA391F9766E01852B56CB6BEA0D25071A5C232AA9 | |||
5008 | lnstaII.tmp | C:\Users\admin\AppData\Roaming\{9026D7E2-C04A-4A5C-830D-5C78CFA216E8}\is-7BSFM.tmp | executable | |
MD5:0A459886E1584024676898D073808059 | SHA256:6AABB0C5B7B5B04E6DFEF398CEF35AF3D9E18A6AB302794FA9F113F91380E3D7 | |||
5008 | lnstaII.tmp | C:\Users\admin\AppData\Roaming\{9026D7E2-C04A-4A5C-830D-5C78CFA216E8}\is-BQAOU.tmp | executable | |
MD5:8EE9144A3EB1EDB97329FD0609E8CD36 | SHA256:15B534451743EBCED68B733E1DE71CABBBEE595AC85B0C8C097D95CE869F5271 | |||
5008 | lnstaII.tmp | C:\Users\admin\AppData\Roaming\{9026D7E2-C04A-4A5C-830D-5C78CFA216E8}\is-04D51.tmp | executable | |
MD5:1E8030AA264522F0D9B4CABD6787807F | SHA256:0B31C371CA1247A8D5451752D17DB277FA3C73A2D85FE0C6ECBB817A3A9A7CC5 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6372 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6372 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.160.128:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
2104 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
t.me |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |