Overview
overview
8Static
static
3xbox-gen.zip
windows7-x64
1xbox-gen.zip
windows10-2004-x64
1README.txt
windows7-x64
1README.txt
windows10-2004-x64
1chromedriver.exe
windows10-2004-x64
1preset.txt
windows7-x64
1preset.txt
windows10-2004-x64
1xbox.exe
windows7-x64
7xbox.exe
windows10-2004-x64
8xbox.pyc
windows7-x64
3xbox.pyc
windows10-2004-x64
3xbox2.exe
windows7-x64
7xbox2.exe
windows10-2004-x64
8xbox2.pyc
windows7-x64
3xbox2.pyc
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
04-08-2024 22:18
Behavioral task
behavioral1
Sample
xbox-gen.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
xbox-gen.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
README.txt
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
README.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
chromedriver.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
preset.txt
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
preset.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
xbox.exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
xbox.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
xbox.pyc
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
xbox.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
xbox2.exe
Resource
win7-20240705-en
Behavioral task
behavioral13
Sample
xbox2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
xbox2.pyc
Resource
win7-20240729-en
Behavioral task
behavioral15
Sample
xbox2.pyc
Resource
win10v2004-20240802-en
General
-
Target
xbox.pyc
-
Size
5KB
-
MD5
61f065bfd934d32cad71648a566354a5
-
SHA1
5053222a221bbcfebdfa3d033e9999d245a01fba
-
SHA256
db8755b8c9425094dc84e6090d5ccfc40a68bb3d848f7c6a621f7afdbf625e83
-
SHA512
a6201ba400d97dc527c10865b211c3a982f9fe503a3b700ac29c1d11ca7935ae3632a176ecfa80861ceb096fcb66a743866eee107370af424812a19a8c3f3f3f
-
SSDEEP
96:OGlzU+46rFVv0gff9SNI7D7SvFm5/4MO2T:OrOPXgN0iJMLT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 AcroRd32.exe 2572 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2740 2772 cmd.exe 31 PID 2772 wrote to memory of 2740 2772 cmd.exe 31 PID 2772 wrote to memory of 2740 2772 cmd.exe 31 PID 2740 wrote to memory of 2572 2740 rundll32.exe 32 PID 2740 wrote to memory of 2572 2740 rundll32.exe 32 PID 2740 wrote to memory of 2572 2740 rundll32.exe 32 PID 2740 wrote to memory of 2572 2740 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xbox.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xbox.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\xbox.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5be2d7ba60817875a5c54e79c75055c0b
SHA1828faca054d794a75f417b667f0eaac692c86e7c
SHA256bb975ba19a3a3c869940ba38cfe74e8ffcef3a49a364dc82d66e011a622cb539
SHA51284b48f2ca8c25d0334c9a725ba00877e8d1e90346183fb79946c13b5caaaf3120bb35453696814f47fdbee096b5147876aa2bdac995ee05bd1fb960d6aab78f6