Resubmissions

20/02/2025, 23:44

250220-3rgd5syjdj 6

20/02/2025, 01:27

250220-bvgqjatkgx 6

11/02/2025, 13:10

250211-qeg4pasmfz 8

09/02/2025, 18:24

250209-w11e2syndl 8

08/02/2025, 15:46

250208-s73l7stjex 8

07/02/2025, 16:24

250207-twhckazmgj 6

29/01/2025, 23:50

250129-3vwcga1qgp 6

Analysis

  • max time kernel
    117s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2025, 16:24

General

  • Target

    Xeno-v1.1.4-x64/Xeno.exe

  • Size

    140KB

  • MD5

    f0d6a8ef8299c5f15732a011d90b0be1

  • SHA1

    5d2e6cc0bd4f1e810808f2a284f6c2a30b21edcf

  • SHA256

    326bae0bd1398234dcef4c3d71f00e30cc9b447fa963e21d6f29605f42bb7e5b

  • SHA512

    5b9f1517949a7fa9fdb7413146632d21a4208dc92823b673af85963ae5cc7f827b3ba27f3e9c5554c45e726ad159aac77d30306acc3559bd8712534e41ff0f27

  • SSDEEP

    3072:2hK4Uay3XrQ8habqgp9pC9Z6p5uf3C6k0xuZ04ntfxDhBury:2hK4XycqgpfCup5sVxuZ04bhA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.4-x64\Xeno.exe
    "C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.4-x64\Xeno.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win7&apphost_version=8.0.11&gui=true
      2⤵
      • System Time Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:604 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3d6a2b20a91de9450acb5b8e35fdca8

    SHA1

    fb8753009b3011c9cbe43a39f226bfda23fb1698

    SHA256

    9ffc12de8c0502c7ddce56812f115b37f344bcb11ac6ce802b29159439b03433

    SHA512

    3deed5260dc110933a2e1be8bf8bbbe5d29760e05caf842836f509e0e2d5a572bef1470eb2b3117741e7415a8929080287a9cb0043c99fc0d76529e43b2c7c26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ebe78789d898dcc16bbfd8757e11fd1

    SHA1

    da88896de6702290dbffa9c37542c97f9de50ffe

    SHA256

    95ce84bcac5a576e1a146d91961b49577eb0ba84fb2a9d226d9a76f825217b77

    SHA512

    2466937ad71db02668663835d6da4b8ea5982c91f018e05c92be2611ce5683735e6d770375f845703f6ad204f7dbd0db28f8cdb34ee854dad7068022e7c9da05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05f4c2c5545230600bdbab5f1ad1c859

    SHA1

    5fb5fbcaefd9d50fc427e22808208c57e7b2ced2

    SHA256

    9210dadafbcd28013c59d4443e1ccda15b074caa5dc4db8b89de453ba28ffc75

    SHA512

    0685b13b50bac00b2672a3f394c632bf2e9241bcdbb8dc6c5be8e0d12a793eef2e85cb47ebef8476e6deb8a6bcae9e6eb817053498214747182b103c7d74d988

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2e93e487b6bef371a02855095654c85

    SHA1

    5db0db0b4d591de4d4678182eedfbe64bc1da4c0

    SHA256

    caacec46100a0349fca5b4283d3f98c076465fae38717d947964c32a31796538

    SHA512

    2ed63daf7853b40981c682e0cc71b3bb50a60ec115de9184577cbce201551010391c09ee6a08095437990f194a171d41803b3f81e574928a57acd0629110f35b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0374213dc52e7fbe655c4ce0bc81da84

    SHA1

    32af95ffe960aa2169c8783c7aa103164a261b88

    SHA256

    c39f1295a39e125e9f17eedf72dd19da780c0f05b5ee4f94165a8837979b3a3d

    SHA512

    99e6a91d86e55132c259c7298beb5e3ef2b0adf3e2dd099edf45a90accdb9502cea6677da034315c1ffe1fc9487075b64562d0334ea590334ef448a190185224

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    068079dd70cf38220a31a86ad4740158

    SHA1

    f98ef51588390d0c4f032c9bf32311386b2bd2e3

    SHA256

    50d03758388b60be90d0220d0fc4a7b1c3ce6490c56f3331b056c9e3494886f0

    SHA512

    41c90f6a3de6bd9c9c519560f0fab0528f2ebc8a49e9034a25528194c0a12c2c5f93f0ac92c30f0a0b30b70703d22cb2d0e36feb9904c31dd31bbae110cd8928

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e032baeaf324bcc0ec6360a8cf6946a

    SHA1

    19453c32b56c5300d8bf1b4d0b19524aa2892410

    SHA256

    0aed6b78462150de8216be87f9e3c89866994f7bd99f23215d40dc48d0991976

    SHA512

    d4e6570daf1b5af314c602166ac850bf25ed6565fcab6858b84a9943f4f005cc6d6ba7b8bdef02de9b5d803f5ab2ea04eae4cb7475de4d15a469bff134f091e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f443d1c95cbe3b8ba28078fdb30f92fc

    SHA1

    787b97444f83ff8e87750af1df9f8844032b1c98

    SHA256

    79425b31519db7a799ac7f1b990ab8d379a372f0ea4755b30a42fca73dd6c253

    SHA512

    8473a639768b44375c0d848ba18cb1cfa041262056e1a3cce9c72bd285bb55567c01bb7b551e18b00a5aca931e67a12605762db0d697dbb3a55f18f9ec6ce847

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a12769ee474c95c346122bff908f3084

    SHA1

    118d3ff1813bb36d40455c82f2f580ae4fc76c0f

    SHA256

    5b3b4f27ce616294628c396ca7177105b4143f0ce68b5c36691fa21ce6fb442d

    SHA512

    8a585613efd5e5354b320b72e9966d4ed48f6853933b2fb983e1b5ae9b7c0cd1be7fa18d3a6e1d98ef2855875e03329052fa8b749949d3f19010e2097116a6ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79378954a1565486898e408bd6053955

    SHA1

    29b2968aae23d8de47460d9ec2810a4998fcdf01

    SHA256

    e427400640f5f1767210faa6fc1c37e15c91062b572c1b07ea045444311be1b1

    SHA512

    30b19767283811bf87d638bf0188a668c6c35c3adc0b2995891d282b99cb072eaad741c00be55deb61d4311ca41dbc23cb26b752144137174e633eba8f039ebd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f0dcdf15d50a5d045a1dd8e1328abc5

    SHA1

    529c8608f990ff276d7b503fdf60446496538eca

    SHA256

    24484dbbd8d5515e6ef9a9bfeb648b71bbe69c5b8da9709a5ffd52fdf603aa35

    SHA512

    b370186ecdfa2f520468669c089cda50a3399c1dfa3b27eba5f6fa7b1e8d159e697b8e282861116fa7ff2d04d03b0c771b2911453450fc01bdb14d40e0bd59b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b541c8b82ce7894868772ea3635a8df1

    SHA1

    f6e2d9ef07d2c2fc9d6e8971e5f957711f8b66cd

    SHA256

    04356ad04678ad351e28c2baf66351946fafb05525491f15f0680730b054ed8e

    SHA512

    6f10c4a798789cd923d163920c6d113b1b5cd96b476faa98c2f5ec6cbdbf454e822bf931362aa12c13aaaa4f8a170bbacd80c3e8183d3956589185be37e9fd21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38663c1b71b588cc9420d88524f5b21a

    SHA1

    8cb9f931ad992c9ec729919c521baf62bbf46b6e

    SHA256

    107bd81fd9d4ae2f2b27dc087c93a5c01a2103c738fb6fb0c63607c7355fdce9

    SHA512

    9d7c41f505c0eb0696155d543e80adcaa636fade34cecd6b40e6fff3ca303f578f5a160bb011d4f17d2f545d6c8004ef788f0c87fc95002a2a814c39e73a41eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a690b65918a1b18403d4b58aa6fdeb6

    SHA1

    6681b1de8f267ce48d3f90e9b1ecb99f0db92c4b

    SHA256

    73ca2f0b51c60f5ead3bb7464bcd8f61ad3ef29e301d05b48707937f85c35177

    SHA512

    9c4c4eebedb2824d32e4895133aca09a6c5d1ab5c6baaa36268f697dada26e4134acad13a8222db4463759a1dcdec8d2ea5497e37bd368d2f8cd37b744b161e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    488350c0f1d2d7d5ea33c0ad711f29f0

    SHA1

    38fee89118a77f3441452a835d7fe29fc0c662fa

    SHA256

    e1ad40a7ba1bc976da5b5f6ab93269dfd2b16582ffae9f9d867431e613b0a0be

    SHA512

    3f699887c668b9654695e8ba931f662c715885d6ea2b326822c24621eef3978dcb8e99d08d233265064bb0e96d0ebe2fb582c3097917686bc324d4ef32b9e7fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfc8def47dc26f099593a84aa7639c0d

    SHA1

    5db0d8655dddb579e63292b742a526417cf5c464

    SHA256

    a5a9d483b4fc4bd0b0bc4250c8fac8fc2feff5be8580f8b6f986f667e3856936

    SHA512

    740de8fbb48b4cb683ef22a784c6422983628088ff4fab49001be2d44ed4ad6eb2b33d18607839c22a2cf9e0051adb6d576b91c36677cf7e8468f2deb9409eb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83118fb4f587eabac9667ac8351848e4

    SHA1

    32a93c933f622dbcfaeaf470ab16c63502d6e9bb

    SHA256

    3802b68e31a4d698d9e9a7688ab58d2690b477b6068f1db0f08ef13bd0bb9c1d

    SHA512

    92036cd01c929384bc4a248d5723e75a8a9749877d8bbc3888983ab25a28bcae41acadc98a86f49ff7835bb3195a2b47d0f348a7ab0ac79939c687b20823f437

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d2bac2247339750dbc94df72d0417c2

    SHA1

    542bbc8a622d483b0788f2f057625a774f7ce233

    SHA256

    1cbba70fcbc1680f6d7bf924e3fabe5848e66486fa464160757f1be70f7086be

    SHA512

    c350baf3d3bc6a0cead02b064fe2077a7516e6f26e72fe8f3e456de7581a8b5f3b565a160c98a3b8f3fab47e309d9017a09cf01033a6fc7b1b7fba43ddfceb97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd3122e581bcf2d16f71f8e5ab4e8fa1

    SHA1

    614ba58bbdf1e10998fdfb6796dbf03ad3d923f9

    SHA256

    24348cbfaa2ac9d03662f57fda09932941c339d81d82d0fa880aa5ba87a8a376

    SHA512

    a76985372362d5ecee7a6b95e43621aea41c1efddfe633b14bfb65e9b80841856da4e57e3dd128dbf936b0684a4f8e1187130e9ce89189d885552c4218f4372d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    984443dcae1313f45637c2dce45574dd

    SHA1

    9ec644b449b8a1240cb5dd35554a49e9be05d7c7

    SHA256

    924ce9086329d3b3c041b821be7dfdd7b5f8c1dcb972da8f43d84fbbe6dc61b9

    SHA512

    23d97320d3aa53e585ca31b17aed75e6a9ce4b3051a55fd8a25fc104878e6a9914089a9610b45260288463fac887c6aaab8f135a71a8e868c8d20e920f818332

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf28497fc7448045c6de3807946f469b

    SHA1

    b7155dff5ea40fd73524fe0a7f14eec2bcae1071

    SHA256

    be163e04e17d96d18af09740b3d570a2432c23d5aab677d5ef851dcd1ae894d7

    SHA512

    506bb883de5911afb1b25e9e2fd5283dd54dda7a0ae0552d86fbfec180f85592965b840661bc92961a163a90ea07bb1fdabac0b839f9e82bec33c2f91bdaa801

  • C:\Users\Admin\AppData\Local\Temp\Cab15A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar17C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2324-0-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB