| File name: | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe |
| Full analysis: | https://app.any.run/tasks/916b0e32-e16d-4815-86a9-c7389f5258f0 |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | July 31, 2025, 15:10:47 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 9A9DA8C930A9F0EDF82D0F0ABFAA6768 |
| SHA1: | 0732C5888CC357522E7E3803DE99AA4E8CFEAF8D |
| SHA256: | 99B66D8309EDBA2AD061E5274A148288012F93A05839A99FF071FEA6FE16D2A5 |
| SSDEEP: | 49152:sAKMb9nTMZAL6kjXRE8g4RqtBtCJjVTturS5L/2xzvlz+a64nl79HoMdL/MpB/Wr:sAPb9noCL6X8+atR5L/2xzIa6ol79IM9 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:02:24 19:19:49+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 29184 |
| InitializedDataSize: | 4135936 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x39e9 |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1044 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1132 | schtasks.exe /create /tn "Metallic" /tr "wscript //B 'C:\Users\admin\AppData\Local\InnoSphere Innovations\InnoSphere.js'" /sc minute /mo 5 /F | C:\Windows\SysWOW64\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1232 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 3636 -s 1036 | C:\Windows\SysWOW64\WerFault.exe | — | Favor.com | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1588 | "C:\WINDOWS\system32\openwith.exe" | C:\Windows\SysWOW64\OpenWith.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Pick an app Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
Rhadamanthys(PID) Process(1588) OpenWith.exe C2 (3)https://176.46.152.18:8181/gDatFeDway/rbiaph9n.18drr https://213.209.150.104:8181/gDatFeDway/rbiaph9n.18drr https://vault-360-nexus.com:8181/gDatFeDway/rbiaph9n.18drr | |||||||||||||||
| 1592 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2028 | extrac32 /Y Kids.accdb *.* | C:\Windows\SysWOW64\extrac32.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® CAB File Extract Utility Exit code: 0 Version: 5.00 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2200 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2628 | cmd /c schtasks.exe /create /tn "Metallic" /tr "wscript //B 'C:\Users\admin\AppData\Local\InnoSphere Innovations\InnoSphere.js'" /sc minute /mo 5 /F | C:\Windows\SysWOW64\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3028 | findstr "SophosHealth nsWscSvc ekrn bdservicehost AvastUI AVGUI & if not errorlevel 1 Set qmvDYdLaziVDfUaXliVzQYuDNy=AutoIt3.exe & Set QuKIgZPzvYzcngXaAXrYuZCwYGzqCzYIl=.a3x & Set WWqMeRKjcLHgpKPOIKJsKWxZOcnJJeNZr=300 | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3636 | Favor.com P | C:\Users\admin\AppData\Local\Temp\834693\Favor.com | cmd.exe | ||||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script (Beta) Exit code: 3221225725 Version: 3, 3, 17, 0 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\Eligible.accdb | binary | |
MD5:311DEBB920E3570839B0A14D3AD417D2 | SHA256:C250AB373A7AED8A7E6551331581D157823D21510DE8765B588302FF66FE41F8 | |||
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\Sixth.accdb | binary | |
MD5:D9CA52389279F2EC5ABE216F994E68C5 | SHA256:059F696AE524BB0B5F591A1A3B025C5ACB6ECEB6DEF071256E91E518F4A05119 | |||
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\Scotia.accdb | binary | |
MD5:371EAD09D23F616593B6B979614A0C13 | SHA256:BE3032C9D6DF5028970C90E6BEBBCBBA911774F6FB667CA51C0CCE96458A9B1F | |||
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\Outlined.accdb | binary | |
MD5:C2D3332A24F7D68DA17C774726108F69 | SHA256:418727D3FCBC9E29581256F5E2B61D6DD1E8573AE44B9CE0758C42E15418431B | |||
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\Afraid.accdb | binary | |
MD5:0A522A95039BB31FED1D39E65EB079D3 | SHA256:7AF36B09500AFCA502F23B8371DF7CB235C54487530849631351AE200FEA0434 | |||
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\Di.accdb | text | |
MD5:A47628D55F6A4098CDD5EE117096C912 | SHA256:F4013C5D5BBF14B05F30ED9EE43723543882285FD7894EC33D172878449E563C | |||
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\nszD687.tmp\nsExec.dll | executable | |
MD5:08E9796CA20C5FC5076E3AC05FB5709A | SHA256:8165C7AEF7DE3D3E0549776535BEDC380AD9BE7BB85E60AD6436F71528D092AF | |||
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\Sara.accdb | binary | |
MD5:6981F4B6169B28AA5DA48341E483747C | SHA256:5666AA8CCBC8FD2C6B549C9D988835DE6F562E014D7E6FD372BB7BF93A97C693 | |||
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\Kids.accdb | binary | |
MD5:3B254E14098256E43F8229E6EAEDB69A | SHA256:B05287E5CF8403FA52614227599A1E2CA3A855DCCAA662F8FEAC6BA13041E40D | |||
| 5620 | _99b66d8309edba2ad061e5274a148288012f93a05839a99ff071fea6fe16d2a5.exe | C:\Users\admin\AppData\Local\Temp\Do.accdb | binary | |
MD5:7E6CE3794C655191374A66E14759DC4C | SHA256:DB0A0E74715EA8DACC5F58A505B5875775984CD0057E3D870C6701ECB8E6C772 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.42:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2992 | RUXIMICS.exe | GET | 200 | 23.216.77.42:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.216.77.42:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2992 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 20.190.159.2:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | GET | 304 | 20.109.210.53:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
— | — | POST | 200 | 20.190.159.131:443 | https://login.live.com/RST2.srf | unknown | xml | 11.1 Kb | whitelisted |
— | — | POST | 200 | 20.190.159.23:443 | https://login.live.com/RST2.srf | unknown | xml | 10.3 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2992 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.216.77.42:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.216.77.42:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2992 | RUXIMICS.exe | 23.216.77.42:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
WGsqMlebVvvKaQ.WGsqMlebVvvKaQ |
| unknown |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2200 | svchost.exe | A Network Trojan was detected | MALWARE [ANY.RUN] Win32/Lumma DNS Activity observed |
2200 | svchost.exe | Domain Observed Used for C2 Detected | MALWARE [ANY.RUN] Win32/Generic CnC related domain (vault-360-nexus .com) |
— | — | Generic Protocol Command Decode | SURICATA HTTP Host header invalid |