Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2023 02:28

General

  • Target

    EMULADOR XBOX 360+CONFIGURACION/xbox 360 emulador/xenia.exe

  • Size

    10.8MB

  • MD5

    6c4cecf64072d8db19fffe1bd8d730f2

  • SHA1

    02e66ffe162fd06344db68acb0ec8e7763d664a3

  • SHA256

    5b556ba3219f3e3d8d8aa73991e475dcd636054e173cbb38f3b7b19285e00822

  • SHA512

    8f017256823013042730a972a75c43069378553017c08517a90b938aa20fa763f2098ee5c7d3d0f4d7fdcebdda07f95d5a1d5730b73069812cae58a670edff5d

  • SSDEEP

    98304:yCBr1Dx3cYGikV581qQLl3kcbqDTOAoPHLrTtX:yCzpSn81qQLl3kIh

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EMULADOR XBOX 360+CONFIGURACION\xbox 360 emulador\xenia.exe
    "C:\Users\Admin\AppData\Local\Temp\EMULADOR XBOX 360+CONFIGURACION\xbox 360 emulador\xenia.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of SetWindowsHookEx
    PID:2772
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2772-134-0x0000000020000000-0x0000000020001000-memory.dmp

    Filesize

    4KB

  • memory/2772-135-0x0000025CEF480000-0x0000025CEF481000-memory.dmp

    Filesize

    4KB

  • memory/2772-136-0x0000025CEF480000-0x0000025CEF481000-memory.dmp

    Filesize

    4KB

  • memory/2772-137-0x0000025CEF480000-0x0000025CEF481000-memory.dmp

    Filesize

    4KB