Resubmissions

21-12-2024 14:43

241221-r337ha1ndz 6

21-12-2024 14:43

241221-r3pzwa1phq 6

Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 14:43

General

  • Target

    Xeno-v1.1.0-x64/XenoUI.exe

  • Size

    140KB

  • MD5

    f0d6a8ef8299c5f15732a011d90b0be1

  • SHA1

    5d2e6cc0bd4f1e810808f2a284f6c2a30b21edcf

  • SHA256

    326bae0bd1398234dcef4c3d71f00e30cc9b447fa963e21d6f29605f42bb7e5b

  • SHA512

    5b9f1517949a7fa9fdb7413146632d21a4208dc92823b673af85963ae5cc7f827b3ba27f3e9c5554c45e726ad159aac77d30306acc3559bd8712534e41ff0f27

  • SSDEEP

    3072:2hK4Uay3XrQ8habqgp9pC9Z6p5uf3C6k0xuZ04ntfxDhBury:2hK4XycqgpfCup5sVxuZ04bhA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.0-x64\XenoUI.exe
    "C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.0-x64\XenoUI.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win7&apphost_version=8.0.11&gui=true
      2⤵
      • System Time Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a25eb2194b00cd79beefe7f9ddc39d0

    SHA1

    ba9b6b4d2182c43f03db11aee345a04b2a716b22

    SHA256

    bc447b9507b8b2fda5e541acf431aca4cd169f959b4dd3ca62b56d1d0e6397df

    SHA512

    00500e6f888e31ff17b23828b2ed7ce1a9766e1f934218b329cdc7d64ac459caaafc8dea5833fc3ea282f253f91b4cc0c51db88b715ed54f6c9a930226a20bd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bba5c5cf8b2d4d963f7f97efee66b2aa

    SHA1

    079b6ee7bc448e9724c5429cd547a1144638b50f

    SHA256

    51af898c0b9f12eb22ca51a446ed903d2dd2cbf4b39b0550dbf0e2e90616eae0

    SHA512

    d56d75d40355a54bf238b6b18ada48494421e8532646b74934cdf717f4bbb09cc52e499ad90a4de721d4ab726a48bc51a8a8b5d3f89078fce348179e422cef35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a058e6a513e271c19c2d3001e32ad37

    SHA1

    52d14d3ad95e28a08c6a937469fe1a7fac86b02b

    SHA256

    4d04a346e268f11f6a1cd43bcbdadeda4716c1d7fdf3dd2548a34b47a8d3b0f4

    SHA512

    9c37fddc6bb90022b883901726bdc67e5108def73a069f8b1a918ecb240827c945425962792afd50ec21e23f5d96037232beff31787a0fdd8508d4066583248f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    adc8d00cb1b3dba4b8e98794484434f8

    SHA1

    c707f5ccd5b57efa760d1951074c8ed416c2588e

    SHA256

    48321a9e02eb22e7b7591f77e81c947fe07caf4767c16d718446e90fbdd73c2b

    SHA512

    7b353e717816e313461c494af76cb11ee07005135c19005c14cc45b5d67e1e891396dcd5bcf0466f595515112875b2615b6e644455cfc1e20cb36c968667b837

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b46715c1a5aa22732fad599f0562a338

    SHA1

    40df595f60d7d1d84e376fe760d0bf82284d8767

    SHA256

    7f0b9d7888012efdfa595881f5370e402f83c9c287cc66949d6f64e4a9c3d088

    SHA512

    093cfecaf43b5e4537a25988f86e5396b76fdd588396ca4baa0cd0be720ee9f0a3b57b6b5eb9c64f21fb0ba22ffca16c74cb3d2ff25f053a2b6e0b6e9e448e6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f45ee3e10a9d310b1a87c9f0d92515dc

    SHA1

    c854f65ea7bf6d52929a2f05e51cc0ae7d3458ec

    SHA256

    1373a3ff9c21558d7d5db280126b7b930104e67dcc8bfd6389aa5fb8bca11da5

    SHA512

    fcdc12bde8bf8ba7fbaf5a57bff383888166085d7f48a27092b5754cf7b52fde65c455fbe50d069be986bc289689b153feba1981fd437e0b74a36ecccc4b6931

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8209e347a8eef33fa411ae6b04c8a8c

    SHA1

    45c277162090b5a22e8b8d5ed9b1ce41f9353960

    SHA256

    04e13d5840ed68b88b4aa58237453819ba1b82015312e57d09266056d4413eb5

    SHA512

    0c49b4218be344714511bd7a9cca7edbf436c3ef1f07c7241cc6ff6742ca40475e4ecf85258314359c2db617d92b79339552653fe3bd8e8726d845a8f2bbb5a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    301197dcd924d58371c67bed5c0d86ad

    SHA1

    6330a1851787e7b427e77ea5918a42ad028da4fa

    SHA256

    6efdf09bf383748bba489b64b8b134f61001a291a973f0c00c9f858c3e42549b

    SHA512

    c62178f3cb8f19d7cecb90cd1e3ac795dfa0f543d3f1cc7114d6b1bcbe9b98a14e006533803acf8ee1392de8a2e30672dc9a86c521342a39255a903d7a542bda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5eb9023c1d56191d0a704cdd49607ce

    SHA1

    473fdc4e7cec50561c6bdae9cec35c0463e31746

    SHA256

    12d97096b550c686030d9a81324df4d193a7f0b09b83a5142988f6630a6ff325

    SHA512

    35768071182fc3ec6a66833e6662e00ad6ad4182ea20d914ace62a0505b32e99dffffac849a14a8153ad6263baf3e3b65c5ddd7de00bc06f1b5fd556d0617c89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be3141903b8de08fe4672ec41cef2951

    SHA1

    39471a428129ce6624f5a3560af34e94a3894128

    SHA256

    4cee4c52fe300e585e1fc9e153a428ced57ff4f47bbd0a4a5d49fb58bfdcc333

    SHA512

    ca3cd45ae9d109bb3bbdb50e4c6ffabdc6bca7ed6c4aa2ce5d1d9ab5f26eadbce764e04ce62f790579e4937473e15d8f7575067920b5e7a3887e3db0bef7f010

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b985852e28810bb612d753813cd3a7a

    SHA1

    faf53f223d55d128e620fd559cfb3034a815ff28

    SHA256

    7d2cdf35e55080896ced2058ff697b863ddcb905b59697a5dfc2dd8de90f4bf9

    SHA512

    6e8118e08854b59afdfc428f759a60e068fbe9a5e80b63dc8970c02f938b283db907cf25826e4fc452aff9e7ddce31d33b4176b96624bd639dd4cabe5a77faec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a964c315a44e2f122dd6613a0c62624

    SHA1

    44ac097d0a4c911ef49111ea6d1c8add4e92233f

    SHA256

    c8ea4294570d39a5a81cac864fff363cc0e182b1e2522bb4fe883d09f9f7ece2

    SHA512

    eb83b63c74d158f1cd200a3b4c799daeddf8cd898ef82ccac81301eff455ad23e7b3d7e5e1a4085e02efebac9c86922eab449602e801046513d38a3c13e4a6b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1045b73223d4bd06f64215b8b2bb9d42

    SHA1

    e27e4a8d94ba485ed71a21a5f332b571518b32fd

    SHA256

    4a35e763dbecf95c858689fe6c108c8d12fa763ca976824c442c114fc6865a99

    SHA512

    504df7da8f48411b960a97d890bb18428e13ea6925c46aa2bc431098ce68b5e47caa7f0ff6199134e92143c80273cc71cea051fe9ad214231f6cc8f3a378654f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b2d90dcc62a051ae88110f0981a1917

    SHA1

    172d2dfb343bac146b16b9d5655e674b8284fbea

    SHA256

    32807ee22a08b71d6e296876a44eb989ef0cc763923d7bf21816fbc20371dc3f

    SHA512

    69dca870e7688a7e087e8a35c50bb299d79a2e7fdf0d84e6d18b1aaee61ff763f5eec59dc1ff7a0a194d2672014b784f0ded35ad1c2c68aa4f8f1cf9b47e7845

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc95e416b0bf96ba4554ae31dfb10d1a

    SHA1

    b8632b2de88ed080956dc685e85af4ba27dd3905

    SHA256

    5fc10d1f1ed9bb772ec5c2c2e7c93510ddf986373537cc541c1ae939f6aa3271

    SHA512

    d7ba14d9b449f00d6a87539acfb7c1c53a4491b51773c001546555049afdbe971c355f9c888adb992450ce48bbf2e3ea0e7c1eae33faa5e4fec6fe0ae4ef87d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    010653a6005fed001c33db0aa94daba0

    SHA1

    dcdf87cb9d7b538ef50a8e5002173353b68dcc26

    SHA256

    0731db56881021537e047360fc983795ea51386e0be69f02ea5aa3ad7eee1a3a

    SHA512

    aaeeea65dcdd3aec4096b15b6093e120c8272c6d5d3a0608cc4dbdc5f546587ae6a4d15038c2fdeb72ecffe0e0e126abd633c66403990034165445405b0e8470

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4538669a04cee81419a8be5a5dcb361b

    SHA1

    ba6cb4a4e3fe68e65107451ca906572da7b0aa3d

    SHA256

    6e2bdb1a1edecda431f7a96856a2bef7a1e65130cc74e3439d173c34603966db

    SHA512

    f23cdd422efa75aa35c2e1ae5e2361ac8264b7797d1e1739b462afca16a8c03c243766c2a16e1497b7b0d2a7541c82179e9e76d9450697babf3633744b7bcaba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49267df0ac4f7a0f63a4ffa1be246f8b

    SHA1

    002a76b309ba0bcf025a503ea7345a6d04428127

    SHA256

    c67386bc61b38c1b07404bde73ab3886a4349ff7a29d7c8e5e3574c6f7e6cb75

    SHA512

    d87a58d7333d19f0ee9d919be401e893b4dc5d0d0f34083a18e6ef36daa0708cc2485cb6493542e7344fff43cfbcede1dff79d175b5c4d123d1a86e87ad68fc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d06b59dcd63f46ae96be2e68dac87ab6

    SHA1

    67190352bb3e5319ba19dab511f0c760d5b1b29f

    SHA256

    1de6420b1d676cb3447c3e8d6841d21ae79c60830043dcdbb016b152917e500f

    SHA512

    96280fe9e425b1f229b442c5a29a1cba2b7a196f6670a095a8f9d3a001f53c0599a4784fac630ed4a0b1415170d4c547c5a6e8c3a1dbfb23bb0f201b10195fec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5706e5260899bbe1a75d941cb2a0bc39

    SHA1

    622c8f39f522dfdee65491f662910782787365bb

    SHA256

    72baf03107f7b90b10aa6accd0d0b36a92272f7f5410e4b6baa19c7986bb4ee9

    SHA512

    d7fe340c124c4e50b0138000d499f6792270e188bd44efadc81ce8a2752271e95436d3eb66235aa296fc9047da11af697b395533a16ff7ba68c0eae3965a4df2

  • C:\Users\Admin\AppData\Local\Temp\CabD8C4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDAAB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/3036-0-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB