Analysis
-
max time kernel
86s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-02-2025 18:19
Behavioral task
behavioral1
Sample
Xeno-v1.1.3-x64/Xeno.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.3-x64/Xeno.exe
Resource
win11-20250211-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.3-x64/XenoUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.3-x64/XenoUI.exe
Resource
win11-20250211-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.3-x64/XenoUI.exe
Resource
win7-20250207-en
General
-
Target
Xeno-v1.1.3-x64/Xeno.exe
-
Size
10.8MB
-
MD5
a10ae5339c94657875b5991d2b4fb0d0
-
SHA1
6bd22c7d3e7ad538e2d8da2ea1e20257795994eb
-
SHA256
0f669ab830e863c182ec5573e59625f76b69db6963e78c868c76e74128f86e2b
-
SHA512
ac15657ed86595279cf2f529a917040a2687e49c953f36973c28147c95fd8d8787df008526c1d4ca5cfdb14d32c1f465242f0f552f264499b476ee3531a7e2ab
-
SSDEEP
196608:M+AQcHKApx3ivNm1E8giq1g9mveNo+wfm/pf+xfdkR6HAxKwCr2WOHWKD3beH:6Qctn3i1m1Nqao+9/pWFGRZ0br2W673k
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2868 Xeno.exe -
resource yara_rule behavioral1/files/0x000400000001cb6f-46.dat upx behavioral1/memory/2868-48-0x000007FEF5F10000-0x000007FEF64F8000-memory.dmp upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2868 2272 Xeno.exe 31 PID 2272 wrote to memory of 2868 2272 Xeno.exe 31 PID 2272 wrote to memory of 2868 2272 Xeno.exe 31 PID 2692 wrote to memory of 2472 2692 chrome.exe 33 PID 2692 wrote to memory of 2472 2692 chrome.exe 33 PID 2692 wrote to memory of 2472 2692 chrome.exe 33 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 2276 2692 chrome.exe 35 PID 2692 wrote to memory of 1664 2692 chrome.exe 36 PID 2692 wrote to memory of 1664 2692 chrome.exe 36 PID 2692 wrote to memory of 1664 2692 chrome.exe 36 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37 PID 2692 wrote to memory of 2320 2692 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.3-x64\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.3-x64\Xeno.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.3-x64\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.3-x64\Xeno.exe"2⤵
- Loads dropped DLL
PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7019758,0x7fef7019768,0x7fef70197782⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:22⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1132 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:12⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2832 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:22⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3200 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3492 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:82⤵PID:288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3472 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:82⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3528 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 --field-trial-handle=1304,i,4300156990477495666,13024983818820897844,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD55d134b28eb7494a42244d5612cc9a8fd
SHA1f56bf19ceb863250bc154119fa2a729eb9af02bb
SHA256f5314e024e45197364d66e27daf03ff08251b979e8186af464311e91feb6fddc
SHA5128b683abf82fe71f90b3d83a8677bdfb8591df59f2d550469b6ade32623edc15cd54545b8287ddaaddec9d0a0e33a6ae6ff463311d44babe88922790364339c59
-
Filesize
5KB
MD5e9dbefaff22caa074c4649917246e3f8
SHA1bb82d95111093ab50439a20b2c8e5e5dceab6644
SHA25689e7c68393f0950da5815f94a304caa629ad94719a397dd8fc1bb1ed4bd3047a
SHA51278661c1f08d4c845010823f765a42cf93b802f0ca56e092e571d2443791bc6b816c30722b46f82d2b18384392c4aa7a89064d0a267472f25a16933de8c8cafcb
-
Filesize
5KB
MD5d196be1e92d960adef10d4ec191e2393
SHA18f93970a0cc951ac4f19352e1badecd69cb38727
SHA2563acaeed2a6e6bd58ed3df3c893a52029a5735727307f8bbb843e965e21e8c244
SHA5126861d848f63e71bc0f93a924d4f1b6acedf4c528648ecb3437a41afd63fcbc63639d444b2cdb15803ec8b9df880fa80e8fd8a5fbc83cedd27ea45a2fbf350d9f
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
178KB
MD5f4cbc8035610611e2300cc8ae8ca5ff0
SHA1d12bab2e774d25b53f944f66e7c41a8db1d88cd7
SHA2563b31152884d02654e6612996238ae685bf906e146e3bc316d4c15fa9c9aeb804
SHA51292bbfb86ede6b424f9ef622ec81428def2e649312ba6775ea42033d1d59cf6527d8898c89c3f2f593049f3dbf42e92d146cbe74ff686082108b4b1dd0213440c
-
Filesize
177KB
MD5c17e35f8d6c919907f2ac6260a2a2421
SHA1a7578445fee4bcde9a62c2dced61f92b6bb102e4
SHA256c3555d97d9b63f3930b3f7d676f833a09346abfd589198b55caf7b4b50f3b1dc
SHA5123dee25e6b9558cb4ebb85aa6c0d5edd1306ea9000239bfed20a942800017f5c7eed8a58a73fa76945fedeeae5d3697fb3617a93b46d18c20cc5f5e013b3261da
-
Filesize
361KB
MD55310db6738db846ab91611695b2fcbe6
SHA1f2a45ef5f155aca8fdfc9c14b4732b3a140e5bb2
SHA2561e9fad8af10b7a901f848bdf61ecb18cfb789a39f33647a0de0d40d05a35d74f
SHA512782c9d9d0ed3a98b10f8267344d4aff635d07a0fb2cc0de41f5de2aac48bde74dda338c00f354f6d6121cf4f9497a9ad461e83645365b03ed79f0f873ee7173c
-
Filesize
1.6MB
MD5db09c9bbec6134db1766d369c339a0a1
SHA1c156d9f2d0e80b4cf41794cd9b8b1e8a352e0a0b
SHA256b1aac1e461174bbae952434e4dac092590d72b9832a04457c94bd9bb7ee8ad79
SHA512653a7fff6a2b6bffb9ea2c0b72ddb83c9c53d555e798eea47101b0d932358180a01af2b9dab9c27723057439c1eaffb8d84b9b41f6f9cd1c3c934f1794104d45