Overview
overview
8Static
static
3xbox-gen.zip
windows7-x64
1xbox-gen.zip
windows10-2004-x64
1README.txt
windows7-x64
1README.txt
windows10-2004-x64
1chromedriver.exe
windows10-2004-x64
1preset.txt
windows7-x64
1preset.txt
windows10-2004-x64
1xbox.exe
windows7-x64
7xbox.exe
windows10-2004-x64
8xbox.pyc
windows7-x64
3xbox.pyc
windows10-2004-x64
3xbox2.exe
windows7-x64
7xbox2.exe
windows10-2004-x64
8xbox2.pyc
windows7-x64
3xbox2.pyc
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
04-08-2024 22:18
Behavioral task
behavioral1
Sample
xbox-gen.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
xbox-gen.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
README.txt
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
README.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
chromedriver.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
preset.txt
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
preset.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
xbox.exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
xbox.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
xbox.pyc
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
xbox.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
xbox2.exe
Resource
win7-20240705-en
Behavioral task
behavioral13
Sample
xbox2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
xbox2.pyc
Resource
win7-20240729-en
Behavioral task
behavioral15
Sample
xbox2.pyc
Resource
win10v2004-20240802-en
General
-
Target
xbox2.exe
-
Size
16.4MB
-
MD5
dcf66999fd8f426e146d25328dbd2736
-
SHA1
af530ba9f2601cbf89837ed9d856ac82593af41f
-
SHA256
b1c99cd04dfa55427465de52f0e746bc7f71ca6691c47286eff318987f9b66d1
-
SHA512
bf2caa7fd343c996da298dd501377b218ed8035852bd2fa9a22cdaa1f09b74a17e3e942f197ba9aeb0bda0dbb5ce3039c25faca563e8e85d62f4e1eb647d5822
-
SSDEEP
393216:CO1+TtIiL0Y9Z8D8Ccl9NKzES8LpurEE0146U04I2uaqPyRhsVCEm:91QtI7a8DZcMZkQrw1HHoHyAEm
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2236 xbox2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2236 2408 xbox2.exe 29 PID 2408 wrote to memory of 2236 2408 xbox2.exe 29 PID 2408 wrote to memory of 2236 2408 xbox2.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35