Resubmissions
02/04/2025, 22:36
250402-2h95esxpz5 330/03/2025, 19:46
250330-yg7q5avzew 629/03/2025, 19:55
250329-ynl31axwgv 629/03/2025, 19:55
250329-ym9gxaxvf1 629/03/2025, 18:18
250329-wxy3taznv5 629/03/2025, 10:24
250329-mfdwwa1xay 729/03/2025, 00:19
250329-amltvawpx2 628/03/2025, 22:33
250328-2gj7lssxgv 6Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 22:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Xeno-v1.1.65.zip
Resource
win10v2004-20250314-en
5 signatures
150 seconds
General
-
Target
Xeno-v1.1.65.zip
-
Size
5.1MB
-
MD5
9460d2d0e73873317cc16dae8c4f885d
-
SHA1
bd4791b77412e57c371b2e13161b10d469025d38
-
SHA256
4e671c40d9d780b85f8a44aa50a5c175a9f2c2a0a530e450a981905713ec5378
-
SHA512
d8db5fc3020ff36989b11f8d4d1eb1e0215d0d99fa957af0de63e2ba9c07687ca6e14ffc4b899973520516ce29b56eddde1938a62fc37c9e4f95a382d29f8063
-
SSDEEP
98304:a4RR0KKnwHS5nAczyzrA+0kWM98TjBH+//p2wB+hQlzim1HEQrclrMYvo:t7Anwy5AcyrR0DMEBeJrGMimkmvYA
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1372 taskmgr.exe Token: SeSystemProfilePrivilege 1372 taskmgr.exe Token: SeCreateGlobalPrivilege 1372 taskmgr.exe Token: 33 1372 taskmgr.exe Token: SeIncBasePriorityPrivilege 1372 taskmgr.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe 1372 taskmgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65.zip1⤵PID:2452
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1308
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1372