Analysis
-
max time kernel
45s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 22:51
Static task
static1
General
-
Target
Xeno-Executor.exe
-
Size
709KB
-
MD5
0fe991a24c993e852f41043c7f896e29
-
SHA1
4f6f3c2230c8f4ad575502c2502c9d550e110432
-
SHA256
d49131d26f9b130f04ab3ffaea57e86a2fdf90ba84001a8acb3fbe36d63186df
-
SHA512
030100853a58924d5e1fe858e1bd15b25e8b4d1268fca5a84097eb13e1e4a01e68f3b595034130b4c3753ac24ff036633ea73f5ee89293c5458371c864d20db1
-
SSDEEP
12288:7yNudyx57oP4Sj8qYS346jvBGDIHHUMF5AATSj8qYS346jvBGDIHHUMF5AAp:7+3x5sASj8TS344sW0Mn1TSj8TS344sc
Malware Config
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4216 set thread context of 3700 4216 Xeno-Executor.exe 83 PID 1492 set thread context of 2728 1492 Xeno-Executor.exe 99 PID 4380 set thread context of 396 4380 Xeno-Executor.exe 102 PID 3444 set thread context of 1148 3444 Xeno-Executor.exe 107 PID 5036 set thread context of 2880 5036 Xeno-Executor.exe 110 PID 4592 set thread context of 4480 4592 Xeno-Executor.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno-Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno-Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno-Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno-Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno-Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno-Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno-Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno-Executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno-Executor.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 4216 wrote to memory of 3700 4216 Xeno-Executor.exe 83 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 1492 wrote to memory of 2728 1492 Xeno-Executor.exe 99 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 4380 wrote to memory of 396 4380 Xeno-Executor.exe 102 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 3444 wrote to memory of 1148 3444 Xeno-Executor.exe 107 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 5036 wrote to memory of 2880 5036 Xeno-Executor.exe 110 PID 4592 wrote to memory of 1956 4592 Xeno-Executor.exe 111 PID 4592 wrote to memory of 1956 4592 Xeno-Executor.exe 111 PID 4592 wrote to memory of 1956 4592 Xeno-Executor.exe 111 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112 PID 4592 wrote to memory of 4480 4592 Xeno-Executor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno-Executor.exe"C:\Users\Admin\AppData\Local\Temp\Xeno-Executor.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\Xeno-Executor.exe"C:\Users\Admin\AppData\Local\Temp\Xeno-Executor.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3700
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\Xeno-Executor.exe"C:\Users\Admin\AppData\Local\Temp\Xeno-Executor.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Xeno-Executor.exe"C:\Users\Admin\AppData\Local\Temp\Xeno-Executor.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Users\Admin\Desktop\Xeno-Executor.exe"C:\Users\Admin\Desktop\Xeno-Executor.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\Desktop\Xeno-Executor.exe"C:\Users\Admin\Desktop\Xeno-Executor.exe"2⤵
- System Location Discovery: System Language Discovery
PID:396
-
-
C:\Users\Admin\Desktop\Xeno-Executor.exe"C:\Users\Admin\Desktop\Xeno-Executor.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\Desktop\Xeno-Executor.exe"C:\Users\Admin\Desktop\Xeno-Executor.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Users\Admin\Desktop\Xeno-Executor.exe"C:\Users\Admin\Desktop\Xeno-Executor.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\Desktop\Xeno-Executor.exe"C:\Users\Admin\Desktop\Xeno-Executor.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\Desktop\Xeno-Executor.exe"C:\Users\Admin\Desktop\Xeno-Executor.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\Desktop\Xeno-Executor.exe"C:\Users\Admin\Desktop\Xeno-Executor.exe"2⤵PID:1956
-
-
C:\Users\Admin\Desktop\Xeno-Executor.exe"C:\Users\Admin\Desktop\Xeno-Executor.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4480
-