File name:

Xeno.exe

Full analysis: https://app.any.run/tasks/908689ee-ba9e-4bb7-b300-a424c108dbc4
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: November 03, 2024, 10:25:23
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
exfiltration
autoit-loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

73BAD031AD7718E0CDCC71D61CC32658

SHA1:

358F318D8EB5674ED2640138F3F480D7FF7F1574

SHA256:

38EB342D432D18D175EC0E9A8F5B2A12DC9B1ED3F59EA22DDC4C3C8465BECA01

SSDEEP:

49152:xRcWVqzqzwNJO92RWWbpcxqMS4Rzbd1Py8CAbEP+6JILMkwdyK1QiOaIoOHjIgbB:xEzqzwnOgoUpKnBHRCAGHGEd6iOaIigV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • svchost.exe (PID: 2172)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2172)
      • Newly.pif (PID: 6112)
    • AutoIt loader has been detected (YARA)

      • Newly.pif (PID: 6112)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Xeno.exe (PID: 4548)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 5932)
    • Executing commands from a ".bat" file

      • Xeno.exe (PID: 4548)
    • Starts CMD.EXE for commands execution

      • Xeno.exe (PID: 4548)
      • cmd.exe (PID: 5932)
    • Application launched itself

      • cmd.exe (PID: 5932)
    • Get information on the list of running processes

      • cmd.exe (PID: 5932)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 5932)
    • The executable file from the user directory is run by the CMD process

      • Newly.pif (PID: 6112)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 5932)
    • Starts application with an unusual extension

      • cmd.exe (PID: 5932)
    • Contacting a server suspected of hosting an CnC

      • Newly.pif (PID: 6112)
      • svchost.exe (PID: 2172)
  • INFO

    • Checks supported languages

      • Xeno.exe (PID: 4548)
      • Newly.pif (PID: 6112)
    • Reads the computer name

      • Xeno.exe (PID: 4548)
      • Newly.pif (PID: 6112)
    • Process checks computer location settings

      • Xeno.exe (PID: 4548)
    • The process uses the downloaded file

      • Xeno.exe (PID: 4548)
    • Create files in a temporary directory

      • Xeno.exe (PID: 4548)
    • Creates a new folder

      • cmd.exe (PID: 6328)
    • Reads mouse settings

      • Newly.pif (PID: 6112)
    • Reads the software policy settings

      • Newly.pif (PID: 6112)
    • Reads the machine GUID from the registry

      • Newly.pif (PID: 6112)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 19:19:54+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 28160
InitializedDataSize: 541696
UninitializedDataSize: 16896
EntryPoint: 0x3883
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 9.270.8.38929
ProductVersionNumber: 9.270.8.38929
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
LegalTrademarks: Virtuoso is a trademark of Immersive Creations Co
ProductName: Virtuoso
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
13
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start xeno.exe no specs cmd.exe conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs #LUMMA newly.pif choice.exe no specs #LUMMA svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
764\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1576findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2360choice /d y /t 5C:\Windows\SysWOW64\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3828tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4508findstr /I "wrsa opssvc" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4548"C:\Users\admin\Desktop\Xeno.exe" C:\Users\admin\Desktop\Xeno.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\xeno.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4868cmd /c copy /b ..\Realized + ..\Completed + ..\Dos + ..\Proprietary + ..\Stockholm + ..\Offense + ..\Sustained U C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5584tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5900findstr /V "EricSunsetCorkPlastic" Marilyn C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
4 091
Read events
4 091
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
10
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4548Xeno.exeC:\Users\admin\AppData\Local\Temp\Dosbinary
MD5:FF59BA8B7519E39FE4AB24E616B25D15
SHA256:B6B67FEBD717FB54AF0FFEC021EE7156515565CD9BE91CF064605D4A3E67C773
4548Xeno.exeC:\Users\admin\AppData\Local\Temp\Completedbinary
MD5:106F1D6DD4138B7169789341B4948283
SHA256:E0ED23204B653A8B20014385EAD1AB1D1F30A2167BE29508B5DCD628AB99B655
4548Xeno.exeC:\Users\admin\AppData\Local\Temp\Realizedbinary
MD5:A84D978D219DC0AE56F824D243B17F64
SHA256:E576EEA832BC545CE75E385A2DDF48765FC0EF4401643525BE6487BE1165BF86
4548Xeno.exeC:\Users\admin\AppData\Local\Temp\Climbingbinary
MD5:24102A0AE237227A256877D03A54521A
SHA256:273AA30B8A525113078F3F99305AAC5711E6943A44B9B4725B36477121D087AE
5932cmd.exeC:\Users\admin\AppData\Local\Temp\Given.battext
MD5:B7D615D28D9F7CDB639CA642A04B507F
SHA256:1F4E654859B42F8B9DC4109A0EFEF2BD5671586E736082E6FFD1DE6686AF68D5
4868cmd.exeC:\Users\admin\AppData\Local\Temp\325443\Ubinary
MD5:CD3E1ACEE72A9FB1C058916920A37BB5
SHA256:D171A3D6080922D1BFB908A3D12380A88BD71BC18831B59AD59C3374B8A9C0B8
4548Xeno.exeC:\Users\admin\AppData\Local\Temp\Marilynbinary
MD5:9D1C97275BBE5A42E159357614FB8691
SHA256:76BF5ED25357783EB39530131FB534D7FA7E91366B5D777E06AAEF0166DD4740
5932cmd.exeC:\Users\admin\AppData\Local\Temp\325443\Newly.pifexecutable
MD5:7853ECDFC2CD16F6BC0D28F9E6E6FFAE
SHA256:4EC96B389D496B5B4CFA23F5B0EC8B97E195F8537E7087CA265F22EEAF154137
4548Xeno.exeC:\Users\admin\AppData\Local\Temp\Giventext
MD5:B7D615D28D9F7CDB639CA642A04B507F
SHA256:1F4E654859B42F8B9DC4109A0EFEF2BD5671586E736082E6FFD1DE6686AF68D5
4548Xeno.exeC:\Users\admin\AppData\Local\Temp\Sustainedbinary
MD5:93403385B6B4503762543FED5E54C934
SHA256:C2907D424DC79469C641855E851C777DEC0F2FD22ED2003FE6D2F19A9E1AAB88
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
26
DNS requests
12
Threats
20

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2444
RUXIMICS.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2444
RUXIMICS.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
104.21.33.140:443
https://goalyfeastz.site/api
unknown
text
18 b
malicious
POST
200
172.67.145.203:443
https://goalyfeastz.site/api
unknown
text
16.7 Kb
malicious
POST
200
104.21.33.140:443
https://goalyfeastz.site/api
unknown
text
18 b
malicious
POST
200
104.21.33.140:443
https://goalyfeastz.site/api
unknown
text
2 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5488
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2444
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2444
RUXIMICS.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6944
svchost.exe
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted
5488
MoUsoCoreWorker.exe
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.74.206
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 23.32.185.131
whitelisted
vyqoyViNqO.vyqoyViNqO
unknown
secretarryjw.cyou
malicious
seallysl.site
malicious
opposezmny.site
malicious
goalyfeastz.site
  • 104.21.33.140
  • 172.67.145.203
malicious
self.events.data.microsoft.com
  • 52.168.117.175
whitelisted

Threats

PID
Process
Class
Message
6112
Newly.pif
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)
2172
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (goalyfeastz .site)
2172
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (opposezmny .site)
2172
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (seallysl .site)
6112
Newly.pif
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
A Network Trojan was detected
ET MALWARE Lumma Stealer CnC Host Checkin
A Network Trojan was detected
ET MALWARE Lumma Stealer Related Activity
Malware Command and Control Activity Detected
STEALER [ANY.RUN] Win32/Lumma Stealer Check-In
A Network Trojan was detected
ET MALWARE Lumma Stealer CnC Host Checkin
A Network Trojan was detected
ET MALWARE Lumma Stealer Related Activity M2
1 ETPRO signatures available at the full report
No debug info