Resubmissions

02/04/2025, 22:36

250402-2h95esxpz5 3

30/03/2025, 19:46

250330-yg7q5avzew 6

29/03/2025, 19:55

250329-ynl31axwgv 6

29/03/2025, 19:55

250329-ym9gxaxvf1 6

29/03/2025, 18:18

250329-wxy3taznv5 6

29/03/2025, 10:24

250329-mfdwwa1xay 7

29/03/2025, 00:19

250329-amltvawpx2 6

28/03/2025, 22:33

250328-2gj7lssxgv 6

Analysis

  • max time kernel
    121s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 22:36

General

  • Target

    Xeno-v1.1.65.zip

  • Size

    5.1MB

  • MD5

    9460d2d0e73873317cc16dae8c4f885d

  • SHA1

    bd4791b77412e57c371b2e13161b10d469025d38

  • SHA256

    4e671c40d9d780b85f8a44aa50a5c175a9f2c2a0a530e450a981905713ec5378

  • SHA512

    d8db5fc3020ff36989b11f8d4d1eb1e0215d0d99fa957af0de63e2ba9c07687ca6e14ffc4b899973520516ce29b56eddde1938a62fc37c9e4f95a382d29f8063

  • SSDEEP

    98304:a4RR0KKnwHS5nAczyzrA+0kWM98TjBH+//p2wB+hQlzim1HEQrclrMYvo:t7Anwy5AcyrR0DMEBeJrGMimkmvYA

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65.zip
    1⤵
      PID:2452
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1308
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1372

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1372-2-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB

      • memory/1372-0-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB

      • memory/1372-1-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB

      • memory/1372-12-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB

      • memory/1372-11-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB

      • memory/1372-10-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB

      • memory/1372-9-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB

      • memory/1372-8-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB

      • memory/1372-7-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB

      • memory/1372-6-0x000001C0A2850000-0x000001C0A2851000-memory.dmp

        Filesize

        4KB