File name:

Nexol.exe

Full analysis: https://app.any.run/tasks/0f2a6504-2ebb-469f-87c0-469eaaa642f6
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: November 10, 2024, 01:38:38
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
lumma
exfiltration
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 7 sections
MD5:

E143B03AAB71F583195DDBB65472E29C

SHA1:

D4573664628BD15DAEBD1C60A68EB651740F5F09

SHA256:

C6B92705F63EF7CC8CA8E3179095AD13D83940A2AC0A03CA82BBAAD6E1FDF86C

SSDEEP:

49152:o2CKvrXgRA/cEC8GEw/61SjaOSpjuNIkAd1ZlYBcZMhcVd2Z1+zc0Iu:9pH/cEC8c61S2uSkAdlYuMGXK+zku

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (YARA)

      • Nexol.exe (PID: 6504)
    • Actions looks like stealing of personal data

      • Nexol.exe (PID: 6504)
  • SUSPICIOUS

    • Executes application which crashes

      • Nexol.exe (PID: 5744)
    • Application launched itself

      • Nexol.exe (PID: 5744)
  • INFO

    • Checks supported languages

      • Nexol.exe (PID: 5744)
      • Nexol.exe (PID: 6504)
    • Reads the computer name

      • Nexol.exe (PID: 6504)
    • Checks proxy server information

      • WerFault.exe (PID: 540)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 540)
    • Reads the software policy settings

      • Nexol.exe (PID: 6504)
      • WerFault.exe (PID: 540)
    • Reads the machine GUID from the registry

      • Nexol.exe (PID: 6504)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:09 10:43:40+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 761856
InitializedDataSize: 78848
UninitializedDataSize: -
EntryPoint: 0x9ddc0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start nexol.exe conhost.exe no specs #LUMMA nexol.exe werfault.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
540C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5744 -s 352C:\Windows\SysWOW64\WerFault.exe
Nexol.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5744"C:\Users\admin\Desktop\Nexol.exe" C:\Users\admin\Desktop\Nexol.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\nexol.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6500\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeNexol.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6504"C:\Users\admin\Desktop\Nexol.exe"C:\Users\admin\Desktop\Nexol.exe
Nexol.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\nexol.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
9 409
Read events
9 409
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
540WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Nexol.exe_8642aef9eef6206574f321f328ce15a3da1aa4_e3941a6d_a4ca0531-d4e5-4c57-850c-20b6528e11bd\Report.wer
MD5:
SHA256:
540WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Nexol.exe.5744.dmpbinary
MD5:E36859C02DB4C1682A8F285162F9BAF4
SHA256:C4C301BA748CC4F9A5A48FA8F944067D64008735D900C2DB0949CCD9CF2A8790
540WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC5FA.tmp.xmlxml
MD5:CA6B1BE67BEC77603A7E6BC5FB2BB410
SHA256:FCC904CD7F969FED47F5E8F09DEB77B6E97D5A66F75C6397E8EEDF2A881762F5
540WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC4FE.tmp.dmpdmp
MD5:DED446800B3852C177E9446229BF7C82
SHA256:33E851515DBBF79B3F32E2607D82721E058317892E8A2DDFD7E7A3E2D14D9869
540WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC59C.tmp.WERInternalMetadata.xmlxml
MD5:DA31EC0E89316726D91102940DE9A9DC
SHA256:AD5369B8AFD3955A32D01A59BEACE11FBF970C7DBD915A2B9C951511685E7B38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
29
DNS requests
9
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1752
RUXIMICS.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1752
RUXIMICS.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
104.21.14.17:443
https://repostebhu.sbs/api
unknown
text
2 b
malicious
POST
200
104.21.14.17:443
https://repostebhu.sbs/api
unknown
text
17.1 Kb
malicious
POST
200
172.67.133.193:443
https://repostebhu.sbs/api
unknown
text
14 b
malicious
POST
200
104.21.14.17:443
https://repostebhu.sbs/api
unknown
text
14 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1752
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6504
Nexol.exe
172.67.133.193:443
repostebhu.sbs
CLOUDFLARENET
US
malicious
6944
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1752
RUXIMICS.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
540
WerFault.exe
20.189.173.22:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
frannbradnj.icu
malicious
repostebhu.sbs
  • 172.67.133.193
  • 104.21.14.17
malicious
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
watson.events.data.microsoft.com
  • 20.189.173.22
whitelisted
www.microsoft.com
  • 23.32.185.131
whitelisted
self.events.data.microsoft.com
  • 20.189.173.14
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .icu Domain
A Network Trojan was detected
ET MALWARE Lumma Stealer Related Activity
A Network Trojan was detected
ET MALWARE Lumma Stealer CnC Host Checkin
A Network Trojan was detected
ET MALWARE Lumma Stealer Related Activity M2
Malware Command and Control Activity Detected
STEALER [ANY.RUN] Win32/Lumma Stealer Check-In
A Network Trojan was detected
ET MALWARE Lumma Stealer CnC Host Checkin
Malware Command and Control Activity Detected
ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration
Malware Command and Control Activity Detected
STEALER [ANY.RUN] Win32/Lumma Stealer Exfiltration
Malware Command and Control Activity Detected
STEALER [ANY.RUN] Win32/Lumma Stealer Check-In
A Network Trojan was detected
ET MALWARE Lumma Stealer CnC Host Checkin
2 ETPRO signatures available at the full report
No debug info