File name:

s.Setup.exe

Full analysis: https://app.any.run/tasks/d3bc29da-9bc5-4b48-a7a8-770a8cc6212b
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: May 10, 2025, 05:53:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
lumma
stealer
autoit-loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

CCB48EA0C227D2BA08A09B2FB687DCF0

SHA1:

07517A9082831D438823DEF24355ADE1B9B8094B

SHA256:

728B3D73A7D96154866B24C36E0BA4C6860034D613BEF5879259437E2BBD7997

SSDEEP:

49152:clcYjNp8FCJw+ufWBhS+3HmM19PaZxAmAJt2ujQ2KeieUUaIx5ekms0pGIKahjnS:c+YjIF/nWBhSHQ9P4AJnjQ2BBPx49s04

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA mutex has been found

      • Specialty.com (PID: 6488)
    • Steals credentials from Web Browsers

      • Specialty.com (PID: 6488)
    • LUMMA has been detected (YARA)

      • Specialty.com (PID: 6488)
    • Actions looks like stealing of personal data

      • Specialty.com (PID: 6488)
    • AutoIt loader has been detected (YARA)

      • Specialty.com (PID: 6488)
  • SUSPICIOUS

    • Get information on the list of running processes

      • cmd.exe (PID: 6620)
    • The executable file from the user directory is run by the CMD process

      • Specialty.com (PID: 6488)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6620)
    • Application launched itself

      • cmd.exe (PID: 6620)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 6620)
    • Reads security settings of Internet Explorer

      • s.Setup.exe (PID: 5244)
    • There is functionality for taking screenshot (YARA)

      • s.Setup.exe (PID: 5244)
      • Specialty.com (PID: 6488)
    • Multiple wallet extension IDs have been found

      • Specialty.com (PID: 6488)
    • Searches for installed software

      • Specialty.com (PID: 6488)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6620)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 6620)
      • s.Setup.exe (PID: 5244)
    • Executing commands from a ".bat" file

      • s.Setup.exe (PID: 5244)
  • INFO

    • Reads the computer name

      • s.Setup.exe (PID: 5244)
      • extrac32.exe (PID: 4560)
      • Specialty.com (PID: 6488)
    • Checks supported languages

      • s.Setup.exe (PID: 5244)
      • extrac32.exe (PID: 4560)
      • Specialty.com (PID: 6488)
    • Creates a new folder

      • cmd.exe (PID: 2568)
    • Create files in a temporary directory

      • extrac32.exe (PID: 4560)
      • s.Setup.exe (PID: 5244)
    • Reads mouse settings

      • Specialty.com (PID: 6488)
    • Reads the software policy settings

      • Specialty.com (PID: 6488)
      • slui.exe (PID: 4024)
    • Process checks computer location settings

      • s.Setup.exe (PID: 5244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:04:10 12:19:23+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 25600
InitializedDataSize: 431104
UninitializedDataSize: 16896
EntryPoint: 0x33e9
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
17
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start s.setup.exe no specs cmd.exe no specs conhost.exe no specs sppextcomobj.exe no specs slui.exe tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs extrac32.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs #LUMMA specialty.com choice.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1056tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2320\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2568cmd /c md 404364C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3100tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3956C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4024"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4120choice /d y /t 5C:\Windows\SysWOW64\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4408findstr /I "opssvc wrsa" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4408findstr /V "MARYLAND" Eve C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4408C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 633
Read events
1 633
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
17
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
5244s.Setup.exeC:\Users\admin\AppData\Local\Temp\Israel.mp3binary
MD5:517F8431878219A70E11C9195EC50FB4
SHA256:DCC5E07A34CE285BFF4B5371E634A309D198FC8D98791F11F340E3F7D8666413
6620cmd.exeC:\Users\admin\AppData\Local\Temp\Sensors.mp3.battext
MD5:095683EBF48000004FCF7E0E4D04056B
SHA256:ADF43785D14FF2CE088FAEF7A2D1FCD18EA3422B005721B34E1695B0E1A3C35F
5244s.Setup.exeC:\Users\admin\AppData\Local\Temp\Ssl.mp3binary
MD5:01029A8A772B6F9527942B1D884EA7C2
SHA256:8F414602C62875CDFEAAE4BFF0F338996C944B5E326B4C695DF04B739268E227
5244s.Setup.exeC:\Users\admin\AppData\Local\Temp\Sensors.mp3text
MD5:095683EBF48000004FCF7E0E4D04056B
SHA256:ADF43785D14FF2CE088FAEF7A2D1FCD18EA3422B005721B34E1695B0E1A3C35F
4560extrac32.exeC:\Users\admin\AppData\Local\Temp\Akabinary
MD5:2D8F693B300C57D4AC5338A137C3EE3D
SHA256:C3B08BD97A187C7E70B94F06D090FB028483549AAF54A4C22E51B8450BC8FD24
4560extrac32.exeC:\Users\admin\AppData\Local\Temp\Reportersbinary
MD5:76BB98C8D732DFB0D970994EBDBA19D5
SHA256:19231376F2B01248E15ACE91C640D4E0F02D7B997B4AB0736DA004B60B8F3324
5244s.Setup.exeC:\Users\admin\AppData\Local\Temp\Statute.mp3binary
MD5:8123CB6CCB2264F4A92A117F6035E519
SHA256:09CA44FD895ECE44F82885D9B119232925F8C388443F60EFD00E72AFFC465C6D
5244s.Setup.exeC:\Users\admin\AppData\Local\Temp\Mainstream.mp3compressed
MD5:5B78CE3CD2F57DF75FC725CD437F6223
SHA256:F0BA2235E5F661AFA4CCED17AAEDF3C0E13D7B1010CA8CDE6FD5FBE64D98943B
4560extrac32.exeC:\Users\admin\AppData\Local\Temp\Notionbinary
MD5:CA3DCB4FCFDDB278B3241D9284713A39
SHA256:38EA4EE2881B9C0DDBC248168917EF13A8E0C31217343CD767574840A4885CA1
4560extrac32.exeC:\Users\admin\AppData\Local\Temp\Prixbinary
MD5:1C0BB02A9B253DE973C5D6E86915FAB6
SHA256:C48888CE8A87FE39B0AC9BF163C7FD819C5FD81AC12E8EFFA766C6408D953BFA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
29
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6592
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6592
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.18:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.164.18
  • 2.16.164.11
  • 2.16.164.27
  • 2.16.164.123
  • 2.16.164.113
  • 2.16.164.112
  • 2.16.164.10
  • 2.16.164.19
  • 2.16.164.26
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.23
  • 40.126.31.129
  • 40.126.31.73
  • 40.126.31.67
  • 40.126.31.71
  • 40.126.31.131
  • 20.190.159.0
  • 20.190.159.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
lUSRLCmeJhdqtZcCApUxU.lUSRLCmeJhdqtZcCApUxU
unknown
polifd.digital
  • 104.21.4.176
  • 172.67.132.80
unknown
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

No threats detected
No debug info