Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 20:47
Behavioral task
behavioral1
Sample
XenoPatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XenoPatch.exe
Resource
win10v2004-20241007-en
General
-
Target
XenoPatch.exe
-
Size
7.5MB
-
MD5
3ea0aeead230da875bedd31537fcbc62
-
SHA1
c260e354d3a8ffeeeb6afb0b126c7940f87d10b6
-
SHA256
7ff6f9e74cfb20dc94e9411e75ed1517c95eecb7633ebcb97d8b90ba789bbfa5
-
SHA512
c4b4813075360dea0bf470fc0aef02c83e5b4dffac0b2a26e18a7732557f32f0e05f6d21dba76494e56de91ca7d1548fb7f07a761450bf91cdb9bf31c34ef380
-
SSDEEP
196608:2CgFI3wfI9jUC2gYBYv3vbWY+iITm1U6fd1EI:OFxIH2gYBgDW/TOzb/
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2500 XenoPatch.exe -
resource yara_rule behavioral1/files/0x0005000000018792-21.dat upx behavioral1/memory/2500-23-0x000007FEF5FF0000-0x000007FEF66B5000-memory.dmp upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2500 XenoPatch.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2500 2132 XenoPatch.exe 30 PID 2132 wrote to memory of 2500 2132 XenoPatch.exe 30 PID 2132 wrote to memory of 2500 2132 XenoPatch.exe 30 PID 2840 wrote to memory of 2740 2840 chrome.exe 33 PID 2840 wrote to memory of 2740 2840 chrome.exe 33 PID 2840 wrote to memory of 2740 2840 chrome.exe 33 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 2992 2840 chrome.exe 35 PID 2840 wrote to memory of 528 2840 chrome.exe 36 PID 2840 wrote to memory of 528 2840 chrome.exe 36 PID 2840 wrote to memory of 528 2840 chrome.exe 36 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37 PID 2840 wrote to memory of 2248 2840 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\XenoPatch.exe"C:\Users\Admin\AppData\Local\Temp\XenoPatch.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\XenoPatch.exe"C:\Users\Admin\AppData\Local\Temp\XenoPatch.exe"2⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a79758,0x7fef6a79768,0x7fef6a797782⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1204 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:22⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:82⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:12⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:12⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2796 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:22⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1332 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD5a01713e0c42ac226492ebb5ae4098ca6
SHA1c8f84b80aa2c8d5ad3221061f0873edcbfd38a30
SHA2567311790b546c0260a76cbc1be94f438f076eeaa4bfb6a9313413f2c9dd379ff1
SHA512f0152cc6ee3faec126d6b2175560ba312962012744da53f16870131f4cdd66550fbf73d6505f4ec02a2fb3e6a4109f59d641449739237d78aab0f21eb5cb984c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
170KB
MD5a4ed99d235aa35abe4432bb4dc6fcbde
SHA11ac5bd86d2ef6d85a5772fc166617e82e6f0bc05
SHA256144d579aaf5bc6bb946b0b1a22d6ba2f9a4985e6d7d271ce5c7dc26b9f53a237
SHA51291ca8e761b500dbdd8d2302d4b532c0b418d437bc0d7e0918a73f5ec9ced1f4cd93bc70e05379aba84c78653a91a04f1b86757e4abdfe02b56bbb2e3efc5ff33
-
Filesize
1.7MB
MD56f7c42579f6c2b45fe866747127aef09
SHA1b9487372fe3ed61022e52cc8dbd37e6640e87723
SHA25607642b6a3d99ce88cff790087ac4e2ba0b2da1100cf1897f36e096427b580ee5
SHA512aadf06fd6b4e14f600b0a614001b8c31e42d71801adec7c9c177dcbb4956e27617fa45ba477260a7e06d2ca4979ed5acc60311258427ee085e8025b61452acec