| File name: | Xeno-Executor.zip |
| Full analysis: | https://app.any.run/tasks/ac068fcd-b0d3-45c6-86be-e49e2b945419 |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | December 21, 2024, 01:34:03 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract, compression method=store |
| MD5: | 869116454C2E854AF01F973D653CA8A6 |
| SHA1: | 906606CA55A15B5CEB894EFC24EB6D7F62EBB5DB |
| SHA256: | 7D591A894CA6BEAF880FDCF0B321B3F7379C7324AFAB3AD72CB965A17CEF150F |
| SSDEEP: | 24576:2JQD8olVRqlowqYh0mdQ2he1Jf875nC66JnJPPx/xE7i2CU88X7IikznJnqWPE/3:2JQD8olVRqlowqYh0mdQ2h6Jf875C66c |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2024:12:19 17:44:26 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | Xeno-Executor/bin/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1224 | "C:\Users\admin\Desktop\Xeno-Executor.exe" | C:\Users\admin\Desktop\Xeno-Executor.exe | Xeno-Executor.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2804 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2992 | "C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\Language.pimx | C:\Windows\System32\OpenWith.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Pick an app Exit code: 2147943623 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3296 | "C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR3612.27180" | C:\Program Files\Windows Defender\MpCmdRun.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Malware Protection Command Line Utility Exit code: 2 Version: 4.18.1909.6 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3612 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Xeno-Executor.zip | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 3812 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR3612.27180\Rar$Scan109339.bat" " | C:\Windows\System32\cmd.exe | — | WinRAR.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4544 | "C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR3612.18442" | C:\Program Files\Windows Defender\MpCmdRun.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Malware Protection Command Line Utility Exit code: 2 Version: 4.18.1909.6 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4708 | "C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\DebugPPF.tmp | C:\Windows\System32\OpenWith.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Pick an app Exit code: 2147943623 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4840 | "C:\Users\admin\Desktop\Xeno-Executor.exe" | C:\Users\admin\Desktop\Xeno-Executor.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3612) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (3612) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (3612) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (3612) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Xeno-Executor.zip | |||
| (PID) Process: | (3612) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3612) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3612) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3612) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3612) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\VirusScan |
| Operation: | write | Name: | DefScanner |
Value: Windows Defender | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3612 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$VR3612.18442\Xeno-Executor.zip\Xeno-Executor\DLLs\Main.ini | text | |
MD5:5BF4353D089309E57865BA86D4199004 | SHA256:96088D93BE0C39001E87B5647BC8FFDEF684A90FA02F0F91D430248F7C3415E2 | |||
| 3612 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$VR3612.18442\Xeno-Executor.zip\Xeno-Executor\bin\DebugPPT.tmp | binary | |
MD5:4969578A5FD8D113AB7783812849C1ED | SHA256:9F2B02BA814C2975A7B6ED5AA03345046A9C9D3036481A8A109B132A951E82A0 | |||
| 3612 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$VR3612.18442\Xeno-Executor.zip\Xeno-Executor\bin\Management.log | text | |
MD5:FF765D6581FE6568AAAE19DE239B2E7A | SHA256:4DD051DE9B04902FC59D411B1C27C42007CACCA4EA52E88D71C897CAD1D990CC | |||
| 3612 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$VR3612.18442\Xeno-Executor.zip\Xeno-Executor\DLLs\Packaged\Main.ini | xml | |
MD5:7B53EBD64E5781E02EAEFB6739A6B556 | SHA256:B975C9251EF7394DCC69F49E54DC5AA5E8DF32F9B5E8C687484DDD840EB94D20 | |||
| 3612 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$VR3612.18442\Xeno-Executor.zip\Xeno-Executor\DLLs\Language.pimx | text | |
MD5:01FBF905F95578B7C2EB370D5BD867B6 | SHA256:A17506A018994501E0CF6847CEEE97F7CD9FFCFFC48B256D180175256FF5C0F7 | |||
| 3612 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$VR3612.18442\Xeno-Executor.zip\Xeno-Executor\DLLs\Packaged\Resource.dll | compressed | |
MD5:4427AEEE68321D0F4D7BEFA74E669F83 | SHA256:A9661F89B8D957F4E71CBE1BA0342A39E5B50A1D80D974E2E1B349A273967F1B | |||
| 3612 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$VR3612.27180\Xeno-Executor.zip\Xeno-Executor\bin\DebugPPT.tmp | binary | |
MD5:4969578A5FD8D113AB7783812849C1ED | SHA256:9F2B02BA814C2975A7B6ED5AA03345046A9C9D3036481A8A109B132A951E82A0 | |||
| 3612 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$VR3612.27180\Xeno-Executor.zip\Xeno-Executor\bin\Management.log | text | |
MD5:FF765D6581FE6568AAAE19DE239B2E7A | SHA256:4DD051DE9B04902FC59D411B1C27C42007CACCA4EA52E88D71C897CAD1D990CC | |||
| 4544 | MpCmdRun.exe | C:\Users\admin\AppData\Local\Temp\MpCmdRun.log | text | |
MD5:1CEC1741B0398220701F38CB3726EEA6 | SHA256:55F9524D7C52F65AC038049CA03ACD4DD164153ED35571C36272014537F83B9A | |||
| 3612 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$VR3612.27180\Xeno-Executor.zip\Xeno-Executor\bin\DebugPPF.tmp | binary | |
MD5:B1E68FABD5C19AAA21DE6351554AAE2E | SHA256:63909409D9C79950289701C4A58605EA7FCD30703163FCE0B4AC81204F0B3CCA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | POST | 200 | 104.21.21.99:443 | https://discokeyus.lat/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 172.67.197.170:443 | https://discokeyus.lat/api | unknown | text | 18.2 Kb | malicious |
— | — | POST | 200 | 104.21.21.99:443 | https://discokeyus.lat/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 172.67.197.170:443 | https://discokeyus.lat/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 104.21.21.99:443 | https://discokeyus.lat/api | unknown | text | 2 b | malicious |
— | — | POST | 200 | 172.67.197.170:443 | https://discokeyus.lat/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 104.21.21.99:443 | https://discokeyus.lat/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 172.67.197.170:443 | https://discokeyus.lat/api | unknown | text | 16 b | malicious |
— | — | POST | 200 | 104.21.21.99:443 | https://discokeyus.lat/api | unknown | text | 48 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 2.23.209.182:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1224 | Xeno-Executor.exe | 172.67.197.170:443 | discokeyus.lat | CLOUDFLARENET | US | malicious |
Domain | IP | Reputation |
|---|---|---|
www.bing.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
bellflamre.click |
| malicious |
grannyejh.lat |
| malicious |
discokeyus.lat |
| malicious |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bellflamre .click) |
— | — | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) |
2192 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) |
1224 | Xeno-Executor.exe | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) |
1224 | Xeno-Executor.exe | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) |
1224 | Xeno-Executor.exe | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) |
1224 | Xeno-Executor.exe | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) |
1224 | Xeno-Executor.exe | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) |
1224 | Xeno-Executor.exe | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) |
1224 | Xeno-Executor.exe | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) |