File name: | setup.exe |
Full analysis: | https://app.any.run/tasks/e09bb1da-5b98-4300-a31e-6e615615fd07 |
Verdict: | Malicious activity |
Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
Analysis date: | May 10, 2025, 06:01:01 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
MD5: | 8F645A473D66C052DA73D51853CB9B12 |
SHA1: | 304A782D244E7D8CE09F945C2EDFC2C384ECAE05 |
SHA256: | D353F890A6D20E2A2FA0BD5D4FFEE499E2BC6DC187D7B5ABE1F4100F4CAFD64F |
SSDEEP: | 49152:1SoQ56OG02xDxB0x5bejwJZRvvUZQiqWPgq7WQuAa+sXadJtbmBUen95TkXoLmVw:8ootZ2xr0x5SjwJZZvlkgkWCRsXadJtW |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2010:04:10 12:19:23+00:00 |
ImageFileCharacteristics: | No relocs, Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 9 |
CodeSize: | 25600 |
InitializedDataSize: | 431104 |
UninitializedDataSize: | 16896 |
EntryPoint: | 0x33e9 |
OSVersion: | 5 |
ImageVersion: | 6 |
SubsystemVersion: | 5 |
Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
664 | Else.com B | C:\Users\admin\AppData\Local\Temp\799209\Else.com | cmd.exe | ||||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script (Beta) Version: 3, 3, 15, 5 Modules
| |||||||||||||||
744 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1052 | cmd /c copy /b 799209\Else.com + Rep + Stockholm + Approximately + Departmental + Reload + Ds + Pete + Gained + Quotes + Highway 799209\Else.com | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
1056 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
2568 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3888 | extrac32 /Y /E Del.accde | C:\Windows\SysWOW64\extrac32.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® CAB File Extract Utility Exit code: 0 Version: 5.00 (WinBuild.160101.0800) Modules
| |||||||||||||||
4040 | findstr "bdservicehost SophosHealth AvastUI AVGUI nsWscSvc ekrn" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4688 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4812 | findstr /I "opssvc wrsa" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4988 | cmd /c md 799209 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
6488 | setup.exe | C:\Users\admin\AppData\Local\Temp\Aid.accde | text | |
MD5:AF3255F9AB439BBA19204E0FD7AB2D52 | SHA256:B596ABC8238F660B9F0ACE0E68849955A641DA4065F47A0B8301345D58FA40A7 | |||
6488 | setup.exe | C:\Users\admin\AppData\Local\Temp\Commissioners.accde | binary | |
MD5:C36C367FBF0B0179B4A3B57AC950D5B6 | SHA256:8C9591C0D226627B4FA21F4E9DEC1188F4501BB17D3C76953B146ABB92FF6385 | |||
6488 | setup.exe | C:\Users\admin\AppData\Local\Temp\Del.accde | compressed | |
MD5:43162F0F70CC457A744473973D6507AA | SHA256:AAE36FD1852050D6F3ADD181481026C4E29D1B54B7DD6297BEA8C03C185E4796 | |||
3888 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Approximately | binary | |
MD5:78300C4AAAF7FBAFB54D913CCCAEEF4D | SHA256:95C6E6EB4E1FE87F8678945314BB1FC655AFE679A801A62F2D7845CD4D2A6F6A | |||
6488 | setup.exe | C:\Users\admin\AppData\Local\Temp\Licenses.accde | binary | |
MD5:0772BD33AAE4899CDD61C95B46159E47 | SHA256:FDE333C20198B8E563AFC28E6F0757EBAED6B2056C4DA18747E88263D63A47D3 | |||
6488 | setup.exe | C:\Users\admin\AppData\Local\Temp\Mattress.accde | binary | |
MD5:7AD9636B5AEBDF77D2196B957379762B | SHA256:D15F7514E5CB64B1CB063CFF02646FF2BF666BF0022FCC56BEE00C01387F5964 | |||
6964 | cmd.exe | C:\Users\admin\AppData\Local\Temp\Aid.accde.bat | text | |
MD5:AF3255F9AB439BBA19204E0FD7AB2D52 | SHA256:B596ABC8238F660B9F0ACE0E68849955A641DA4065F47A0B8301345D58FA40A7 | |||
3888 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Ds | binary | |
MD5:EF9F78108BB019E4E7913E53B0E7A26A | SHA256:5E3B42AECC6ADD8D5E955EF129DD07BDE184B74DB71EF5670DA11D42285AA519 | |||
6488 | setup.exe | C:\Users\admin\AppData\Local\Temp\Internship.accde | binary | |
MD5:F8F42C65732F81E44B4CD9C14671A21A | SHA256:AE1361CFFFB050271FE6465F62D16B831979BB89FCF03C6FA4800F3135EB8C08 | |||
3888 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Departmental | binary | |
MD5:4E517AA754A70F4BC4008F28DCADCF1F | SHA256:D10D847ACFE4E96BCFC6F184A48237A5DF3BE76F9532A132F354456B0E2E37E9 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.58:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4724 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
4724 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.16.164.58:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.159.131:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
664 | Else.com | 104.21.64.1:443 | nightloqv.run | CLOUDFLARENET | — | unknown |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
hYNdTCpkwhWzrHoRaRS.hYNdTCpkwhWzrHoRaRS |
| unknown |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
nightloqv.run |
| unknown |
slscr.update.microsoft.com |
| whitelisted |