Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 11:41

General

  • Target

    Xeno-Executor-master/expense_tracker/config/desktop.py

  • Size

    150B

  • MD5

    a09c35a281ee7965614bfac8fed77ede

  • SHA1

    f8c4a9f6ea90b985b9c821ed47e0677b85645077

  • SHA256

    89bcda712cd2420c8a33cac1a4fa6b52ff521d1e0861db697577fec26aa6e8fc

  • SHA512

    fe3afdca3b68b2d7c8840ffc9e3f60c3dd114f2ab8b22dbd8e06ce03115b63e4d916df7b0bf0d703b729fc03b6e2e0125c7230ed8cec4a19dd2da428cbfdb2d1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Xeno-Executor-master\expense_tracker\config\desktop.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Xeno-Executor-master\expense_tracker\config\desktop.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Xeno-Executor-master\expense_tracker\config\desktop.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d13641a054bff5b7796193016177e43f

    SHA1

    833063399711f5ca3de21938210453dedf7c0fc6

    SHA256

    d793c3de98c1ca4cbbcd80b056036f5a63e3e2e9dff1deb4acbaa28486b49bff

    SHA512

    7c774290f1e5e27336671a51fc978373ef404142c199d10202f9790524bf8e50d356b114f44dfe68a5a010595bdf76fb2c4befc755c0de58fc29d31ca048abd1