Resubmissions

12-10-2024 10:59

241012-m3mgja1frq 6

12-10-2024 10:54

241012-mzm9na1fjj 8

12-10-2024 10:51

241012-mx9pwawhjg 7

Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 10:51

General

  • Target

    Xeno 1.18 FIXED.zip

  • Size

    23.3MB

  • MD5

    d9e7849984e3104859af0f032370693c

  • SHA1

    6bf9f6c6c0b11615ab5c855144cfd7158ef7ae16

  • SHA256

    b593394a96a6e8589c815eaae68a457cba927d8051505562da5d16726f4c0277

  • SHA512

    605be5d92861f9e1382501cd195b9ef5ea5ca0d8099eef2b5db095c954883862445d56e2ecaed7c52efdca71ea35f828c8c8d04059131fee79b4fb4a34170a96

  • SSDEEP

    393216:d+/pKFG+pd2Si/IiPD6cNaX54TUL7jhQA55mfp2O3JBeX54TxLgjhQA55mfruiI8:cRKUlZ6TX5lxshnGX5Aaszuixv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Xeno 1.18 FIXED.zip"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\7zOC9BB4007\XenoUI.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOC9BB4007\XenoUI.exe"
      2⤵
      • Executes dropped EXE
      PID:2452
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2848

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7zOC9BB4007\XenoUI.exe

      Filesize

      144KB

      MD5

      994a84c1c1712ac9b768ed11d71a9307

      SHA1

      819b76ba1585d9957a61d52ac31dc95de91694ca

      SHA256

      d1d5d27176b6cdd5fc0436c771ba51c78bfb50ed2d1a7db98d9ff704d2dff1e6

      SHA512

      1175d966cc7e3b5039dcd114290c41785cf9cebc5c544e76c1bbd9c0e8e9d9652a01e585b1defa9ad949faa7eb49168fb444c25c24c4c69084406c6f423b047d