General
-
Target
Xeno-v1.0.9-x64-New.zip
-
Size
7.1MB
-
Sample
241203-ttv6mssraz
-
MD5
b32e1b06f1a530bdfd3c43abde00df1e
-
SHA1
5f25d1ce95c71963b67708e13739b8e3ebd65d9b
-
SHA256
d4494d6239ab355a31308234f5c4508c6b31cb2e89e0636101de41bd60d544fb
-
SHA512
5f249c82222bcf8ce8b3e65720c2aa362c8ab6ff53c4aa5e1193a9f48ad628a7edf18f4756f3091f8b0ba0498dd0ef82fe0fe787c5e31a404679b8bea1171e93
-
SSDEEP
196608:gCoNYe5eqB3aM//Cwj0lY8MT0iSi1WhLObay4VhF0:1oNY8TB3//CwIlY8MIiSi1WpvvhF0
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.0.9-x64-New.zip
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Xeno-v1.0.9-x64-New.zip
-
Size
7.1MB
-
MD5
b32e1b06f1a530bdfd3c43abde00df1e
-
SHA1
5f25d1ce95c71963b67708e13739b8e3ebd65d9b
-
SHA256
d4494d6239ab355a31308234f5c4508c6b31cb2e89e0636101de41bd60d544fb
-
SHA512
5f249c82222bcf8ce8b3e65720c2aa362c8ab6ff53c4aa5e1193a9f48ad628a7edf18f4756f3091f8b0ba0498dd0ef82fe0fe787c5e31a404679b8bea1171e93
-
SSDEEP
196608:gCoNYe5eqB3aM//Cwj0lY8MT0iSi1WhLObay4VhF0:1oNY8TB3//CwIlY8MIiSi1WpvvhF0
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
2Query Registry
5System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1