Resubmissions

16/03/2025, 09:05

250316-k2j9nsw1fy 6

13/03/2025, 23:43

250313-3qy8kawsdz 10

Analysis

  • max time kernel
    899s
  • max time network
    613s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/03/2025, 23:43

General

  • Target

    Xeno-v1.1.55/bin/Monaco/index.html

  • Size

    164KB

  • MD5

    001dcbb8f41cdcbf9b4d1e3a0ed4b2d2

  • SHA1

    982a05814546017c40771e59e7677b53d84787e9

  • SHA256

    f1d2c52f2803c29585b81d2eff74c56242d27e9619ee6d38081d5604c5bb1951

  • SHA512

    9a4eba2a9314b6f5851997e1db0ecfae8e40da3443d8a5f9df933ccf6a4d75fc330888c8d14818326e15b3dec9ae2f5f7e73cd08c3822dd7eb0b2d753c8cd8fa

  • SSDEEP

    3072:Nk4J09UmmJv8kBpZaFD48VOAGUWYPjDZlLJbRBiPEP8yKUz2Ojmjr8zM3KP7pblM:64J09BA3pZaFD48VOAGUWYPjdlLJbRBS

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.55\bin\Monaco\index.html
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83f4bdcf8,0x7ff83f4bdd04,0x7ff83f4bdd10
      2⤵
        PID:5844
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1468,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2108 /prefetch:11
        2⤵
          PID:1588
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2080,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2076 /prefetch:2
          2⤵
            PID:1848
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2384,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2540 /prefetch:13
            2⤵
              PID:2032
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3272 /prefetch:1
              2⤵
                PID:2624
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3328 /prefetch:1
                2⤵
                  PID:408
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4200,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4216 /prefetch:9
                  2⤵
                    PID:5064
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5144,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5160 /prefetch:14
                    2⤵
                      PID:2004
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5180,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5332 /prefetch:14
                      2⤵
                        PID:2924
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5408,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5388 /prefetch:14
                        2⤵
                          PID:3360
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5432,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5480 /prefetch:14
                          2⤵
                            PID:6080
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=4232,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1124 /prefetch:10
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3108
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4572,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1528 /prefetch:14
                            2⤵
                              PID:1796
                          • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                            1⤵
                              PID:5476
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                              1⤵
                                PID:2492

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                Filesize

                                414B

                                MD5

                                76c6a7bb3de2cbf45eab09d91a2d4e80

                                SHA1

                                0c170c723b2d335b1cf712918619a981cfc5d505

                                SHA256

                                b0a38e586fe3098ae1d23d0bf50356a3c8997ed5465df3c746c9979d0a21e1f9

                                SHA512

                                283a62dd95b97da03cdbc12448f2015c135ff38d5d4f1bd9b213664d5c55454164d66aaad9852edd37c0482566b32d5f81bbcf611183c1a932420c91438d474e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                0fda9f45c4f0e12ef4e6deb8f278be1c

                                SHA1

                                333d517a7dc46385e0f6819c22d94596e01c0a1e

                                SHA256

                                64b9289ba89cf482a31a902ed7d4d5244962f8d51416e1471614053e20af06bc

                                SHA512

                                93809d2d1b5a6282ed24b9f9775915f67b3dd3f3dc01ee169e23e92d23dc46559f80c4431acd666b7626a4fed06b1d430c4e768b3da86107d55cbd328bfb95f1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                516B

                                MD5

                                9318789e80e5ceec86d4e4861f88b815

                                SHA1

                                3880451c913f6c64cb0820253eebac4f1f170a90

                                SHA256

                                dab7054a02c3b2eab6f0710f97106baba11e7dcc11e0a9972799019ac06f29b2

                                SHA512

                                0c3143a494b033f39f04af311d21fdd53aef12f6765a9e7d804c74ae2533876bea4e75e51871ce0d635828b43c62e1f9870a0d1b62328afbf726b7dcd7bb8548

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                bec48c2b451ce655def3a728bb15f602

                                SHA1

                                60ca96d468bab41c736f182ed89f4cf63ba93138

                                SHA256

                                3d3824496db8dfc2e8cece23a5114607f5c075242361772cee10740b6f4bf308

                                SHA512

                                0b61f8d73964f3fd36d19bdbe469503dac560ce46781362b7b02c547adc068bc761d30611a1ec2ad2878cff2868032ec30418a9edafe543d5673d5dad7d82914

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                15KB

                                MD5

                                8c767153270134ff67f3dd4ec752018c

                                SHA1

                                42410c9826c5ff96cfdc8163096d903d687da0d2

                                SHA256

                                25dcc03ab8d06e9b12461e9227bb92a15634b66ebe6760d3a322ef492a4cc7bf

                                SHA512

                                df952af3cb1514315dec428fe4aae1d8de2d7e2a53a1fa250ae47c5af5f3c1af177ad0a2f34d9eeeb40b073157860d2055b79823a1cb399f51b415b92a7c9739

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                Filesize

                                72B

                                MD5

                                5463be078cd2481f9afda24760282401

                                SHA1

                                46f0add09b1838b5daa60c592f705cbbad662019

                                SHA256

                                8b069c88c90cb715420232630ae9588797adb7ecf19926ff8b0502a6193ef8a4

                                SHA512

                                6f7a5234644613d7ca99273e31cbb16bfa5e84624e1399db420928de9041c3b4b9491876ebd986f3736a4ce489d1386c71731ccda86c655978488e1697277922

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58369b.TMP

                                Filesize

                                48B

                                MD5

                                8e06f81c42e04dfa99fcf0c1db5508a0

                                SHA1

                                ac62b46832167657255d8aaabaf92b3cf434ea3a

                                SHA256

                                fc3abcc7f0391cbe8ba526935096ecd3384684e792c434e08be99148ce0e234b

                                SHA512

                                70e633ac2858fa92cc0abcbd501ad31574bf4543758f6590d075053e9eaff3ee41b14e1c516563e72d06a83ba0e37277e14c1af6a130e0deed9229e8bf90ab15

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                81KB

                                MD5

                                d5fd9a6ddb66144e08cc18b4cba509e1

                                SHA1

                                fda74ac1e62e40a641eeeca1f69102fd8b2e8728

                                SHA256

                                1b671a5d28092fafd262f403df707dfaae4c5aeaf88944f7b3ad56edec2648b9

                                SHA512

                                f2ea421152dfd46816e92f3d593c4251d18d444df0a4cc7585338def94f3a7e1f43681584e5a71816b51fe0743f7cf5a192cff85f18c22ad16eac002f9414664

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                81KB

                                MD5

                                5ea949587011589e113a685861180d8a

                                SHA1

                                045ea630b16bdcae6c9c4d0e907133773ddb3d39

                                SHA256

                                811b49d82d419dd00c10ed4c05267842747d42cccbc539e954e4c46601d5c05a

                                SHA512

                                0e58b402cb54328f6c5edeae30c7104ea984a4a75935ce4540e59d5073d434aeb718976fe3b416f55a075bbddfd7e1c4ad3592bcbdd773225cf3d8f2f1d6e6be

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                80KB

                                MD5

                                02960d6a331457becea2693059977560

                                SHA1

                                af4a2edd10ee1438350a5282d96164eefad93fce

                                SHA256

                                d59dbaa9e1e6adb2a2aa59f73d761df9dbf6c584fb6ae0fb05ac7891cb77412f

                                SHA512

                                bf85524879609efc78840f59e09c4979d3e15853e14bb026550095cd0f09ed915131fa108a27e7601fcdd9dc5c5735004e0031976ff6345de41d0fc6aaa81e4d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                81KB

                                MD5

                                ed1cdc38d73aa6dd3412c7164450d4f4

                                SHA1

                                8504acbbfed535706660217163527b7d61abc168

                                SHA256

                                51c60576d62b06e279a7c4e965585f33410baa1a05f42517449da536a356d785

                                SHA512

                                901fe9f42a39ab7e205e97f4eda48a9a8e7b929021b983428b98038144deba9bf108561b4ab8b42c4261cc48c3692cfb7cf10844ea61190eb7fe49f287acb197