File name:

_4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exe

Full analysis: https://app.any.run/tasks/33714388-5e59-4242-a448-3c8ab0325ac6
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: October 22, 2025, 12:34:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
lumma
stealer
autoit
auto-startup
auto-sch
anti-evasion
rhadamanthys
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

1CE9392BB065C76CC0A04EF6B369F1C2

SHA1:

E5099DC55CE40465A2603A1D0507B8D82F02FEF3

SHA256:

4E98E9C1660FC47D62D53D06279B856ADFFF9A37CA1970B84F07075CEE66ED3E

SSDEEP:

49152:WP3tZ7YIPJ2aLp7RY9L3l+kM1Tgd/kLTAzKY/YQ7cgQy+cunC/fklyLmUXfqKmA7:WP1Aad7gITgdsw+Y/GxyznHklyTXfqK7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 8040)
    • Create files in the Startup directory

      • Graphs.scr (PID: 7952)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2276)
    • RHADAMANTHYS has been detected (YARA)

      • OpenWith.exe (PID: 5884)
      • OpenWith.exe (PID: 6204)
  • SUSPICIOUS

    • Get information on the list of running processes

      • cmd.exe (PID: 7440)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7440)
    • Executing commands from a ".bat" file

      • _4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exe (PID: 7396)
    • Starts CMD.EXE for commands execution

      • _4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exe (PID: 7396)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 7440)
    • The executable file from the user directory is run by the CMD process

      • Graphs.scr (PID: 7952)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7440)
    • There is functionality for taking screenshot (YARA)

      • Graphs.scr (PID: 7952)
    • The process checks if it is being run in the virtual environment

      • OpenWith.exe (PID: 5884)
      • OpenWith.exe (PID: 6204)
    • Connects to unusual port

      • OpenWith.exe (PID: 5884)
      • OpenWith.exe (PID: 6204)
    • Executes application which crashes

      • Graphs.scr (PID: 6756)
      • Graphs.scr (PID: 5576)
    • Executable content was dropped or overwritten

      • Graphs.scr (PID: 7952)
  • INFO

    • Checks supported languages

      • _4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exe (PID: 7396)
      • extrac32.exe (PID: 7844)
      • Graphs.scr (PID: 6756)
      • Graphs.scr (PID: 5576)
      • Graphs.scr (PID: 7952)
    • Create files in a temporary directory

      • extrac32.exe (PID: 7844)
      • _4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exe (PID: 7396)
    • Reads mouse settings

      • Graphs.scr (PID: 7952)
    • The sample compiled with english language support

      • Graphs.scr (PID: 7952)
    • Creates files or folders in the user directory

      • Graphs.scr (PID: 7952)
    • Launching a file from the Startup directory

      • Graphs.scr (PID: 7952)
    • Manual execution by a user

      • cmd.exe (PID: 8040)
      • OpenWith.exe (PID: 5884)
      • Graphs.scr (PID: 6756)
      • OpenWith.exe (PID: 6204)
      • Graphs.scr (PID: 5576)
    • Launching a file from Task Scheduler

      • cmd.exe (PID: 8040)
    • Checks proxy server information

      • slui.exe (PID: 2628)
    • Reads the software policy settings

      • slui.exe (PID: 2628)
    • Reads the computer name

      • extrac32.exe (PID: 7844)
      • Graphs.scr (PID: 7952)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Rhadamanthys

(PID) Process(5884) OpenWith.exe
C2 (2)https://178.16.53.236:6343/gateway/vz2az6v1.hi4j2
https://the-encyclopedia-of-digital-entrepreneurship-and-innovation.com:6343/gateway/vz2az6v1.hi4j2
(PID) Process(6204) OpenWith.exe
C2 (2)https://178.16.53.236:6343/gateway/vz2az6v1.hi4j2
https://the-encyclopedia-of-digital-entrepreneurship-and-innovation.com:6343/gateway/vz2az6v1.hi4j2
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2059:08:08 23:27:35+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.3
CodeSize: 26624
InitializedDataSize: 1655296
UninitializedDataSize: -
EntryPoint: 0x6d50
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
154
Monitored processes
20
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start _4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exe no specs tapiunattend.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs extrac32.exe no specs findstr.exe no specs graphs.scr cmd.exe no specs conhost.exe no specs schtasks.exe no specs #LUMMA svchost.exe graphs.scr #RHADAMANTHYS openwith.exe werfault.exe no specs slui.exe graphs.scr #RHADAMANTHYS openwith.exe werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2276C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2628C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3996C:\WINDOWS\system32\WerFault.exe -u -p 5576 -s 488C:\Windows\System32\WerFault.exeGraphs.scr
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\oleaut32.dll
4140C:\WINDOWS\system32\WerFault.exe -u -p 6756 -s 528C:\Windows\System32\WerFault.exeGraphs.scr
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
5576C:\Users\admin\AppData\Local\Temp\IXP000.TMP\240288\Graphs.scr C:\Users\admin\AppData\Local\Temp\IXP000.TMP\240288\Graphs.scr
explorer.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
3221225477
Version:
3, 3, 17, 0
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\240288\graphs.scr
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5884"C:\WINDOWS\system32\openwith.exe"C:\Windows\System32\OpenWith.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Rhadamanthys
(PID) Process(5884) OpenWith.exe
C2 (2)https://178.16.53.236:6343/gateway/vz2az6v1.hi4j2
https://the-encyclopedia-of-digital-entrepreneurship-and-innovation.com:6343/gateway/vz2az6v1.hi4j2
6204"C:\WINDOWS\system32\openwith.exe"C:\Windows\System32\OpenWith.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Rhadamanthys
(PID) Process(6204) OpenWith.exe
C2 (2)https://178.16.53.236:6343/gateway/vz2az6v1.hi4j2
https://the-encyclopedia-of-digital-entrepreneurship-and-innovation.com:6343/gateway/vz2az6v1.hi4j2
6756C:\Users\admin\AppData\Local\Temp\IXP000.TMP\240288\Graphs.scr C:\Users\admin\AppData\Local\Temp\IXP000.TMP\240288\Graphs.scr
explorer.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
3221225477
Version:
3, 3, 17, 0
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\240288\graphs.scr
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7396"C:\Users\admin\Desktop\_4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exe" C:\Users\admin\Desktop\_4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\_4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7416TapiUnattend.exeC:\Windows\SysWOW64\TapiUnattend.exe_4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Windows(TM) Telephony Unattend Action
Exit code:
2147942405
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tapiunattend.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
4 362
Read events
4 362
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
24
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
7396_4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Offers.pdftext
MD5:6AAB6996230E3D198998535B76621BBE
SHA256:4B9188834293842C8FF4935D715F9FA75A68D7EEFFE25DED65A079CFA98F174A
7440cmd.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Offers.pdf.battext
MD5:6AAB6996230E3D198998535B76621BBE
SHA256:4B9188834293842C8FF4935D715F9FA75A68D7EEFFE25DED65A079CFA98F174A
7844extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Teachersbinary
MD5:E48188EE2F123025CD27584D903C46C9
SHA256:E15E07514AE9F090D89B3CE2CE8CE46BF01F55A1E63F7A8C5D44405407F276A0
7844extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Sourcebinary
MD5:F502DC7831C2D2CC7BF7002B7429C877
SHA256:E1616F0AD31CDCB755B65489E18861EB4EFDC6EF1A5DE39231B5CD854DAE3285
7396_4e98e9c1660fc47d62d53d06279b856adfff9a37ca1970b84f07075cee66ed3e.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Tries.pdfbinary
MD5:86624BD302ACE05216877D8454FC3D4B
SHA256:BE5F385397B80DD6BCD449D016C399CC230074EA3716ECC92E56F30F394B4CF1
7844extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Patientsbinary
MD5:66AABDF106299C46F7598D5346C15929
SHA256:2D659596293E7ADDDBD4F99B7124EA0C5F1BCEB664A469037D63F595FCE6DD74
7844extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Anniebinary
MD5:AB33C04A6C5B9EE608337B9CA8A5AF9C
SHA256:E95DDEFCB91DF8CE5825EFD488E0775F6ED02B63DE0FDBF04BB3967796222EE9
7844extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Pubsbinary
MD5:7DCCF2EF684CC11C086D04C6B30CE648
SHA256:D3B222F8DE4F0CDF78553FDE52155AEF598E324D1C440900692E4358FA02BB53
7844extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Stockingsbinary
MD5:4BAC8FC25C7F43FA147E0F3FB9062D54
SHA256:89AB1943AB8A1A5173E68B455C15D82D21A60548A1DE3279719E47FED8F7B921
7844extrac32.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Beneficialbinary
MD5:366CCB719C65B1C09F30244AB6F3F383
SHA256:0F352967CF0504F53B50565A83A33F6EE3ED0029C38BC47542091D3C1CFC68FF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
32
DNS requests
9
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
500
4.154.185.43:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
POST
500
4.154.209.85:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5812
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
3956
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5596
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5596
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5812
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5524
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5884
OpenWith.exe
104.16.248.249:443
cloudflare-dns.com
CLOUDFLARENET
whitelisted
5884
OpenWith.exe
172.67.162.252:6343
the-encyclopedia-of-digital-entrepreneurship-and-innovation.com
CLOUDFLARENET
US
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.78
whitelisted
yyPTUXdYDHhpEHhPSFRJC.yyPTUXdYDHhpEHhPSFRJC
unknown
cloudflare-dns.com
  • 104.16.248.249
  • 104.16.249.249
whitelisted
the-encyclopedia-of-digital-entrepreneurship-and-innovation.com
  • 172.67.162.252
  • 104.21.49.123
malicious
activation-v2.sls.microsoft.com
  • 4.154.185.43
whitelisted
self.events.data.microsoft.com
  • 20.42.65.84
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2276
svchost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Lumma DNS Activity observed
Generic Protocol Command Decode
SURICATA HTTP Host header invalid
Generic Protocol Command Decode
SURICATA HTTP Host header invalid
No debug info