Analysis

  • max time kernel
    151s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2024 17:11

General

  • Target

    Xeno Executor.exe

  • Size

    154.6MB

  • MD5

    1d932d5598c44d2ba24c72c7f58d3f37

  • SHA1

    2724b9bc5a48da781cfa5dab2dd55ae128ad3c5c

  • SHA256

    7f6c1fd9df66629e5845465b61b9e13924448788c222e70551c14ee9c1eebf35

  • SHA512

    04a7bd5f09a3d6c41833ce0eb8c8cb8c64b9aca64e193e0a81e8894103d69f0aa596108263c50aca585ae62259db1bdfe8695ea16f0a5a212ae210032f7fd889

  • SSDEEP

    1572864:gTmw0ciLNpDPuAvHxJLkY2O6Ea3f9kwZXeT6EivLp1vUAtdjtZn+f4FnIvGaC9dU:Tv6E70+Mk

Malware Config

Signatures

  • Hexon family
  • Hexon stealer

    Hexon is a stealer written in Electron NodeJS.

  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates processes with tasklist 1 TTPs 7 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xeno Executor.exe
    "C:\Users\Admin\AppData\Local\Temp\Xeno Executor.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3696
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1784
    • C:\Users\Admin\AppData\Local\Temp\Xeno Executor.exe
      "C:\Users\Admin\AppData\Local\Temp\Xeno Executor.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\unrealgame" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1796,i,7288770170956724391,14274170683344550639,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:4796
      • C:\Users\Admin\AppData\Local\Temp\Xeno Executor.exe
        "C:\Users\Admin\AppData\Local\Temp\Xeno Executor.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\unrealgame" --mojo-platform-channel-handle=2004 --field-trial-handle=1796,i,7288770170956724391,14274170683344550639,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2028
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5048
        • C:\Windows\system32\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4824
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3336
        • C:\Windows\system32\where.exe
          where /r . cookies.sqlite
          3⤵
            PID:2900
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1068
          • C:\Windows\system32\tasklist.exe
            tasklist
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:4004
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\system32\tasklist.exe
            tasklist
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2892
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9223 --profile-directory=Default --window-position=-2400,-2400
          2⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff99fc2cc40,0x7ff99fc2cc4c,0x7ff99fc2cc58
            3⤵
              PID:2168
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2072,i,451209703020849071,17567944605727177444,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2068 /prefetch:2
              3⤵
                PID:1792
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,451209703020849071,17567944605727177444,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:3
                3⤵
                  PID:2940
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,451209703020849071,17567944605727177444,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2600 /prefetch:8
                  3⤵
                    PID:4788
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,451209703020849071,17567944605727177444,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:1
                    3⤵
                    • Uses browser remote debugging
                    PID:3504
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,451209703020849071,17567944605727177444,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3388 /prefetch:1
                    3⤵
                    • Uses browser remote debugging
                    PID:4436
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4612,i,451209703020849071,17567944605727177444,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4572 /prefetch:1
                    3⤵
                    • Uses browser remote debugging
                    PID:2196
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --window-position=-2400,-2400
                  2⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  PID:444
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99cad46f8,0x7ff99cad4708,0x7ff99cad4718
                    3⤵
                      PID:1244
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16212992643113272847,5028961386947376879,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
                      3⤵
                        PID:4408
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,16212992643113272847,5028961386947376879,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2552
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,16212992643113272847,5028961386947376879,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:8
                        3⤵
                          PID:2012
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2140,16212992643113272847,5028961386947376879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                          3⤵
                          • Uses browser remote debugging
                          PID:552
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2140,16212992643113272847,5028961386947376879,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                          3⤵
                          • Uses browser remote debugging
                          PID:1616
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2140,16212992643113272847,5028961386947376879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:1
                          3⤵
                          • Uses browser remote debugging
                          PID:3280
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2140,16212992643113272847,5028961386947376879,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:1
                          3⤵
                          • Uses browser remote debugging
                          PID:2932
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                        2⤵
                          PID:636
                          • C:\Windows\system32\tasklist.exe
                            tasklist
                            3⤵
                            • Enumerates processes with tasklist
                            PID:2848
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                          2⤵
                            PID:4992
                            • C:\Windows\system32\tasklist.exe
                              tasklist
                              3⤵
                              • Enumerates processes with tasklist
                              PID:4788
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                            2⤵
                              PID:2964
                              • C:\Windows\system32\tasklist.exe
                                tasklist
                                3⤵
                                • Enumerates processes with tasklist
                                PID:2804
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "where /r . *.sqlite"
                              2⤵
                                PID:1704
                                • C:\Windows\system32\where.exe
                                  where /r . *.sqlite
                                  3⤵
                                    PID:4876
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                                  2⤵
                                    PID:4304
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist
                                      3⤵
                                      • Enumerates processes with tasklist
                                      PID:4256
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
                                    2⤵
                                      PID:1264
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /F /T /IM chrome.exe
                                        3⤵
                                        • Kills process with taskkill
                                        PID:3152
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
                                      2⤵
                                        PID:3588
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /F /T /IM msedge.exe
                                          3⤵
                                          • Kills process with taskkill
                                          PID:4284
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
                                        2⤵
                                          PID:3008
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /F /T /IM chrome.exe
                                            3⤵
                                            • Kills process with taskkill
                                            PID:648
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
                                          2⤵
                                            PID:2464
                                            • C:\Windows\system32\taskkill.exe
                                              taskkill /F /T /IM msedge.exe
                                              3⤵
                                              • Kills process with taskkill
                                              PID:1424
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
                                            2⤵
                                              PID:932
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /F /T /IM chrome.exe
                                                3⤵
                                                • Kills process with taskkill
                                                PID:2876
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
                                              2⤵
                                                PID:1396
                                                • C:\Windows\system32\taskkill.exe
                                                  taskkill /F /T /IM msedge.exe
                                                  3⤵
                                                  • Kills process with taskkill
                                                  PID:3264
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM chrome.exe"
                                                2⤵
                                                  PID:4436
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /F /T /IM chrome.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1476
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "taskkill /F /T /IM msedge.exe"
                                                  2⤵
                                                    PID:2900
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /F /T /IM msedge.exe
                                                      3⤵
                                                      • Kills process with taskkill
                                                      PID:2436
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM EpicGamesLauncher.exe /F"
                                                    2⤵
                                                      PID:2932
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill /IM EpicGamesLauncher.exe /F
                                                        3⤵
                                                        • Kills process with taskkill
                                                        PID:1620
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM javaw.exe /F"
                                                      2⤵
                                                        PID:3556
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill /IM javaw.exe /F
                                                          3⤵
                                                          • Kills process with taskkill
                                                          PID:4984
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Steam.exe /F"
                                                        2⤵
                                                          PID:4892
                                                          • C:\Windows\system32\taskkill.exe
                                                            taskkill /IM Steam.exe /F
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:3260
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "cscript //B "C:\Users\Admin\AppData\Local\Temp\open.vbs""
                                                          2⤵
                                                            PID:2936
                                                            • C:\Windows\system32\cscript.exe
                                                              cscript //B "C:\Users\Admin\AppData\Local\Temp\open.vbs"
                                                              3⤵
                                                              • Checks computer location settings
                                                              PID:4256
                                                              • C:\Users\Admin\AppData\Local\Temp\hexon_761f01ea3dd2ef12.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\hexon_761f01ea3dd2ef12.exe" HXN-MONTHLY-BA59F1FEAAAA discord
                                                                4⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                PID:1068
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
                                                                  5⤵
                                                                    PID:472
                                                                    • C:\Windows\System32\reg.exe
                                                                      C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
                                                                      6⤵
                                                                        PID:2588
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\20241015-1068-mhz20l.cdc7s.png" "
                                                                      5⤵
                                                                        PID:2612
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\SCREEN~1\SCREEN~1.BAT"
                                                                          6⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3816
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6A78.tmp" "c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC4B68AC116A23485187A449184459A8B2.TMP"
                                                                            7⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4816
                                                                        • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe
                                                                          screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\20241015-1068-mhz20l.cdc7s.png"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          PID:1940
                                                                • C:\Users\Admin\AppData\Local\Temp\Xeno Executor.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Xeno Executor.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\unrealgame" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1064 --field-trial-handle=1796,i,7288770170956724391,14274170683344550639,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                                                  2⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:2444
                                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                1⤵
                                                                  PID:1596
                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                  1⤵
                                                                    PID:4596
                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                    1⤵
                                                                      PID:2588

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                      Filesize

                                                                      2B

                                                                      MD5

                                                                      d751713988987e9331980363e24189ce

                                                                      SHA1

                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                      SHA256

                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                      SHA512

                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      c2d9eeb3fdd75834f0ac3f9767de8d6f

                                                                      SHA1

                                                                      4d16a7e82190f8490a00008bd53d85fb92e379b0

                                                                      SHA256

                                                                      1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                                                      SHA512

                                                                      d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      e55832d7cd7e868a2c087c4c73678018

                                                                      SHA1

                                                                      ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                                                      SHA256

                                                                      a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                                                      SHA512

                                                                      897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e7aa9f65-d8e3-4817-9b69-964978f1d6e8.tmp

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      46b7d296b46ee34248efa8a80e00b9bb

                                                                      SHA1

                                                                      be12ed1514059ab2ef4bc994f8eea50820a52a6c

                                                                      SHA256

                                                                      2e05a2b1af96636b6895e7f8f13212854d0a02cdda766991200ec12b6a15e5c2

                                                                      SHA512

                                                                      01abafd4c05febba04d31b717932017b6f30466d5167dde84d7837d5a6ea5884d9a9535cf2fb70852afc4ade727265885f23fbb3cc2ef7307489778774905e34

                                                                    • C:\Users\Admin\AppData\Local\Temp\20241015-1068-mhz20l.cdc7s.png

                                                                      Filesize

                                                                      432KB

                                                                      MD5

                                                                      abca6b6ce8d41b87d16fdcdafbdc1cff

                                                                      SHA1

                                                                      28e3038f8de12ba1df2e84eb2251e6df5a11bfbb

                                                                      SHA256

                                                                      be86600a2666216cf6098f7220171cfb805e158337f5184516210f2539015b6a

                                                                      SHA512

                                                                      cf45cec1b849857ca0578d087127b32beb3a41d76f9eb9038ccdf8dc18b383d9fbabfa2cccd3511ee6fcd66d78fcec82488c155b35386a993545eed22d40637e

                                                                    • C:\Users\Admin\AppData\Local\Temp\8e9b6ade-f6a5-436f-b577-bfc1644b59cc.tmp.node

                                                                      Filesize

                                                                      137KB

                                                                      MD5

                                                                      04bfbfec8db966420fe4c7b85ebb506a

                                                                      SHA1

                                                                      939bb742a354a92e1dcd3661a62d69e48030a335

                                                                      SHA256

                                                                      da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

                                                                      SHA512

                                                                      4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

                                                                    • C:\Users\Admin\AppData\Local\Temp\RES6A78.tmp

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      d4275c137d5bf4593b2485c887e5d4c1

                                                                      SHA1

                                                                      1225ffa2cac47be8e6a1c0a3f5a01f992e8d6cb6

                                                                      SHA256

                                                                      2dc292b999882f37da60fb8756c59b90264b11a7ff2ca82d154e46fcbaed1b69

                                                                      SHA512

                                                                      b54a7344750109e6934bbdcadd2f4f114a9796537f02ce8f7dd710f74a1547a85cf1781c156830cc13247bdaa9652a08d521f17aa612c1144a800145d4f2fbd0

                                                                    • C:\Users\Admin\AppData\Local\Temp\a30d9e17-c294-4ecd-8a70-5779b71cf731.tmp.node

                                                                      Filesize

                                                                      1.6MB

                                                                      MD5

                                                                      31016f8cdd853e3aedeed1090c2b8fed

                                                                      SHA1

                                                                      632f26a63fd6d5e75516c84ab500623a275b9e76

                                                                      SHA256

                                                                      1a3968f0b0bb55709843fc9621c69cb578befd9fb4505dd003b1aed4451a0379

                                                                      SHA512

                                                                      9e0cb9b448cb5a36f7952bef06cc54e434f1f206559b1ad2226b23515d316f05e728f9a8243f7a737dcfd0f647cd2c20a41550d1b8d5eefee240126c2df3efff

                                                                    • C:\Users\Admin\AppData\Local\Temp\open.vbs

                                                                      Filesize

                                                                      194B

                                                                      MD5

                                                                      400812a7f174729231bfcf8f54a6a6ac

                                                                      SHA1

                                                                      1039b81a84028807aaa6534934449515fc080955

                                                                      SHA256

                                                                      e05530c1decab3f9425e6bebf8990b47d38a6711e2e6f5ff1294353f38d1b7d6

                                                                      SHA512

                                                                      acff927252480be5f03ec8592e7a282f1c2d4e802b0bd3d0cd312aa348a811dcb35c958dfdbaa31803d8d5cd57e5af03a0ff00f328133a7821d117ae5c49623c

                                                                    • C:\Users\Admin\AppData\Local\Temp\passwords_0.db

                                                                      Filesize

                                                                      40KB

                                                                      MD5

                                                                      a182561a527f929489bf4b8f74f65cd7

                                                                      SHA1

                                                                      8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                      SHA256

                                                                      42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                      SHA512

                                                                      9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                    • C:\Users\Admin\AppData\Local\Temp\pkg\f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c\sqlite3\build\Release\node_sqlite3.node

                                                                      Filesize

                                                                      1.8MB

                                                                      MD5

                                                                      66a65322c9d362a23cf3d3f7735d5430

                                                                      SHA1

                                                                      ed59f3e4b0b16b759b866ef7293d26a1512b952e

                                                                      SHA256

                                                                      f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c

                                                                      SHA512

                                                                      0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21

                                                                    • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat

                                                                      Filesize

                                                                      13KB

                                                                      MD5

                                                                      da0f40d84d72ae3e9324ad9a040a2e58

                                                                      SHA1

                                                                      4ca7f6f90fb67dce8470b67010aa19aa0fd6253f

                                                                      SHA256

                                                                      818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b

                                                                      SHA512

                                                                      30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9

                                                                    • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      a4cdf4e189fedc37b800670ea3cf077a

                                                                      SHA1

                                                                      62f31a9684825e01302076090f03cbdcb2de962d

                                                                      SHA256

                                                                      3d9d6780e6a9c6726f45b05aa461ab26ce7c5939e7fd52bf72e633c77bd03f79

                                                                      SHA512

                                                                      3c9cfadeaa26aea6774b5fd64c2c7529cc2bd7c0a0fc1c3bb2d8c4599ff4eec6ca4e76de313a7b6110294a7249b34beff7479dca818e453711d6719be1f88c95

                                                                    • C:\Users\Admin\AppData\Local\Temp\ug3sp2uwc2li\Cookies\Chrome.txt

                                                                      Filesize

                                                                      250B

                                                                      MD5

                                                                      47786e46f60df537118ad104e610f448

                                                                      SHA1

                                                                      a118719c6201f584b22b664b224284526626aa0a

                                                                      SHA256

                                                                      088a54d69a244986d9be7d584d2bae2d3ce3c0c4f62557fec3ba95b93a175d15

                                                                      SHA512

                                                                      9c168b23da6ce7082f55b0386feffa386ff1dbdacf168ec19bbfdcbe350b80fab3238ec920f165f0272569af2932744e408ed1128532c67b8edd1668ab946c82

                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC4B68AC116A23485187A449184459A8B2.TMP

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      a6f2d21624678f54a2abed46e9f3ab17

                                                                      SHA1

                                                                      a2a6f07684c79719007d434cbd1cd2164565734a

                                                                      SHA256

                                                                      ab96911d094b6070cbfb48e07407371ddb41b86e36628b6a10cdb11478192344

                                                                      SHA512

                                                                      0b286df41c3887eecff5c38cbd6818078313b555ef001151b41ac11b80466b2f4f39da518ab9c51eeff35295cb39d52824de13e026c35270917d7274f764c676

                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\screenCapture\app.manifest

                                                                      Filesize

                                                                      350B

                                                                      MD5

                                                                      8951565428aa6644f1505edb592ab38f

                                                                      SHA1

                                                                      9c4bee78e7338f4f8b2c8b6c0e187f43cfe88bf2

                                                                      SHA256

                                                                      8814db9e125d0c2b7489f8c7c3e95adf41f992d4397ed718bda8573cb8fb0e83

                                                                      SHA512

                                                                      7577bad37b67bf13a0d7f9b8b7d6c077ecdfb81a5bee94e06dc99e84cb20db2d568f74d1bb2cef906470b4f6859e00214beacca7d82e2b99126d27820bf3b8f5

                                                                    • \??\pipe\crashpad_1496_OFDMRBYXFHKFQXMZ

                                                                      MD5

                                                                      d41d8cd98f00b204e9800998ecf8427e

                                                                      SHA1

                                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                      SHA256

                                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                      SHA512

                                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                    • memory/1940-208-0x0000000000E00000-0x0000000000E0A000-memory.dmp

                                                                      Filesize

                                                                      40KB

                                                                    • memory/2444-214-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2444-216-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2444-215-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2444-220-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2444-222-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2444-226-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2444-225-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2444-224-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2444-223-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2444-221-0x000001FE6FB00000-0x000001FE6FB01000-memory.dmp

                                                                      Filesize

                                                                      4KB