download:

/tahir-zaqout/Xeno-Executor/releases/download/2024/Xeno.zip

Full analysis: https://app.any.run/tasks/6d784587-3270-4ed5-baa7-f5fc3a445919
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 30, 2024, 20:40:23
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
arch-exec
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

C01123A36F77B6DB255860287D8C5657

SHA1:

F65D190837D7CE2EDEEA3FBF8DA4A0C37C11726B

SHA256:

4FE94C690F55A836F5BB5070C0BD9B47A0EEEAC1C80CA8160DAD85F6604E9768

SSDEEP:

98304:5z0ngMjqRPooJl92RoYtfM1I6Mb/+rJ2JyP+IeI9Xo6DbqMZXHNLkOD1Orak45MC:DhuO7c9la

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • aspnet_regiis.exe (PID: 3544)
    • LUMMA has been detected (SURICATA)

      • aspnet_regiis.exe (PID: 3544)
    • LUMMA has been detected (YARA)

      • aspnet_regiis.exe (PID: 3544)
    • LUMMA mutex has been found

      • aspnet_regiis.exe (PID: 3544)
    • Steals credentials from Web Browsers

      • aspnet_regiis.exe (PID: 3544)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6492)
    • The process drops C-runtime libraries

      • WinRAR.exe (PID: 6492)
    • Executable content was dropped or overwritten

      • Xeno.exe (PID: 7080)
    • Executes application which crashes

      • Xeno.exe (PID: 7080)
    • Process requests binary or script from the Internet

      • aspnet_regiis.exe (PID: 3544)
    • Connects to the server without a host name

      • aspnet_regiis.exe (PID: 3544)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 6492)
    • Checks supported languages

      • Xeno.exe (PID: 7080)
      • aspnet_regiis.exe (PID: 3544)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6492)
    • Reads the computer name

      • Xeno.exe (PID: 7080)
      • aspnet_regiis.exe (PID: 3544)
    • Creates files or folders in the user directory

      • Xeno.exe (PID: 7080)
      • WerFault.exe (PID: 6320)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6492)
    • Reads the software policy settings

      • aspnet_regiis.exe (PID: 3544)
      • WerFault.exe (PID: 6320)
    • Checks proxy server information

      • WerFault.exe (PID: 6320)
    • Manual execution by a user

      • Xeno.exe (PID: 7080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:11:20 14:59:40
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: config.ini
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe xeno.exe conhost.exe no specs #LUMMA aspnet_regiis.exe werfault.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3544"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
Xeno.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_regiis.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\aspnet_regiis.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
6320C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7080 -s 1228C:\Windows\SysWOW64\WerFault.exe
Xeno.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6492"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Xeno.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7080"C:\Users\admin\Desktop\Xeno.exe" C:\Users\admin\Desktop\Xeno.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
computer revolutionize idea.exe
Exit code:
3762504530
Version:
9.3.8.3
Modules
Images
c:\users\admin\desktop\xeno.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7088\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeXeno.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 998
Read events
5 964
Write events
21
Delete events
13

Modification events

(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Xeno.zip
(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6492) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
5
Suspicious files
5
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6320WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Xeno.exe_48dd345b8e23817132b9cfbf186c11f54c5303_8a3a4c12_6bd26e8f-1522-43bb-af1d-2cfecb587c77\Report.wer
MD5:
SHA256:
6320WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Xeno.exe.7080.dmp
MD5:
SHA256:
6492WinRAR.exeC:\Users\admin\Desktop\d3d9.dllexecutable
MD5:7B7447B345BE7891C781915FFB1F4DCE
SHA256:91E0B91A628C32113DBFFD820CBE219A55F54D68B4AEDBDCC849C70EE3772223
6320WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA8B7.tmp.dmpbinary
MD5:A74E3D146DCB995C826E440895BEFC3F
SHA256:12BE071C0DB579499AE502A7AC9A2378A537416FC78977380B5750D547E6CFCF
6492WinRAR.exeC:\Users\admin\Desktop\Xeno.exeexecutable
MD5:DEA32FFBC87664069813695A8D3D1B64
SHA256:CEAD1FAD9FA0AC918EB11991CA27FB7BA11C1546D05FC0C9F85CDD9603229EB2
6320WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA9E0.tmp.WERInternalMetadata.xmlxml
MD5:7EC9A0D1504A51E5B7C7870CDFB485AE
SHA256:1EA0A46A84D13F9FF897A450C9F42C87CA07483F70F460D3A9882AD876AFB5DA
6492WinRAR.exeC:\Users\admin\Desktop\vcruntime140_1.dllexecutable
MD5:7E986E7469D9AB3B1138353418DA1793
SHA256:0E560532E721B6938DAFE4055EEDD0251BA5EB5994CD96937CEBBCF16A7DDAE5
6320WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:B3D59D07D70E325EB3F86AF753CA33A7
SHA256:B998923673CDA54300A803255466B8D30B43F292B05E202FFD64B68BACBDE9FE
6320WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6492WinRAR.exeC:\Users\admin\Desktop\d3dx9_24.dllexecutable
MD5:B165DF72E13E6AF74D47013504319921
SHA256:1EC422BD6421C741EEF57847260967F215913649901E21DD9C46EB1B3BB10906
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
30
DNS requests
11
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6072
svchost.exe
GET
200
104.124.1.216:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3544
aspnet_regiis.exe
GET
147.45.47.81:80
http://147.45.47.81/conhost.exe
unknown
unknown
6320
WerFault.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3876
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
104.124.1.216:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6320
WerFault.exe
GET
200
104.124.1.216:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6072
svchost.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6072
svchost.exe
104.124.1.216:80
crl.microsoft.com
Akamai International B.V.
US
whitelisted
4712
MoUsoCoreWorker.exe
104.124.1.216:80
crl.microsoft.com
Akamai International B.V.
US
whitelisted
5064
SearchApp.exe
95.101.143.201:443
www.bing.com
Akamai International B.V.
GB
whitelisted
104.124.1.216:80
crl.microsoft.com
Akamai International B.V.
US
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4712
MoUsoCoreWorker.exe
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted
6072
svchost.exe
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.251.39.110
whitelisted
crl.microsoft.com
  • 104.124.1.216
whitelisted
www.bing.com
  • 95.101.143.201
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.microsoft.com
  • 23.200.189.225
whitelisted
fancywaxxers.shop
  • 104.21.80.1
malicious
watson.events.data.microsoft.com
  • 104.208.16.94
whitelisted
self.events.data.microsoft.com
  • 13.89.178.26
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

PID
Process
Class
Message
3544
aspnet_regiis.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
3544
aspnet_regiis.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
No debug info