File name:

XenoxBuildAsos.exe

Full analysis: https://app.any.run/tasks/ba25e540-dfe5-439b-b509-b4557dee6d96
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: June 21, 2025, 21:19:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
trox
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

4CD6D5DF34E890985869429ADE6A82EA

SHA1:

CEE29A8CB4EF6C02FF592D40815C328B6D322CAA

SHA256:

97673752A3ABAA81AECD6B3296D94F436D9475B59B404241F78588965F0ECED7

SSDEEP:

98304:1vJJfcllsZU5iRVGXk6f8nXCB5ldV2sy8i79gv2NJQxHxial0w3FFG8rL7asLlT2:ZFExkqro7i50QNy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • TROX has been detected

      • XenoxBuildAsos.exe (PID: 1944)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • XenoxBuildAsos.exe (PID: 1944)
    • Process drops python dynamic module

      • XenoxBuildAsos.exe (PID: 1944)
    • Process drops legitimate windows executable

      • XenoxBuildAsos.exe (PID: 1944)
    • The process drops C-runtime libraries

      • XenoxBuildAsos.exe (PID: 1944)
    • Loads Python modules

      • gUTwW9T2iuD5ypB5khYp-obf.exe (PID: 5960)
    • Reads security settings of Internet Explorer

      • XenoxBuildAsos.exe (PID: 1944)
  • INFO

    • Create files in a temporary directory

      • XenoxBuildAsos.exe (PID: 1944)
    • The sample compiled with english language support

      • XenoxBuildAsos.exe (PID: 1944)
    • Checks supported languages

      • XenoxBuildAsos.exe (PID: 1944)
      • gUTwW9T2iuD5ypB5khYp-obf.exe (PID: 5960)
    • Reads the machine GUID from the registry

      • gUTwW9T2iuD5ypB5khYp-obf.exe (PID: 5960)
    • Reads the computer name

      • gUTwW9T2iuD5ypB5khYp-obf.exe (PID: 5960)
      • XenoxBuildAsos.exe (PID: 1944)
    • Checks proxy server information

      • slui.exe (PID: 640)
    • Reads the software policy settings

      • slui.exe (PID: 640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:03:02 03:58:00+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.34
CodeSize: 126464
InitializedDataSize: 61952
UninitializedDataSize: -
EntryPoint: 0xb934
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #TROX xenoxbuildasos.exe gutww9t2iud5ypb5khyp-obf.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
640C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1944"C:\Users\admin\Desktop\XenoxBuildAsos.exe" C:\Users\admin\Desktop\XenoxBuildAsos.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\xenoxbuildasos.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
5960"C:\Users\admin\Desktop\XenoxBuildAsos.exe" C:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\gUTwW9T2iuD5ypB5khYp-obf.exeXenoxBuildAsos.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\onefile_1944_133950143572638174\gutww9t2iud5ypb5khyp-obf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\temp\onefile_1944_133950143572638174\python310.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
Total events
4 038
Read events
4 038
Write events
0
Delete events
0

Modification events

No data
Executable files
19
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_decimal.pydexecutable
MD5:1CDD7239FC63B7C8A2E2BC0A08D9EA76
SHA256:384993B2B8CFCBF155E63F0EE2383A9F9483DE92AB73736FF84590A0C4CA2690
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_ctypes.pydexecutable
MD5:79F339753DC8954B8EB45FE70910937E
SHA256:35CDD122679041EBEF264DE5626B7805F3F66C8AE6CC451B8BC520BE647FA007
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_socket.pydexecutable
MD5:5DD51579FA9B6A06336854889562BEC0
SHA256:3669E56E99AE3A944FBE7845F0BE05AEA96A603717E883D56A27DC356F8C2F2C
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_queue.pydexecutable
MD5:C9EE37E9F3BFFD296ADE10A27C7E5B50
SHA256:9ECEC72C5FE3C83C122043CAD8CEB80D239D99D03B8EA665490BBCED183CE42A
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_lzma.pydexecutable
MD5:5A77A1E70E054431236ADB9E46F40582
SHA256:F125A885C10E1BE4B12D988D6C19128890E7ADD75BAA935FE1354721AA2DEA3E
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_ssl.pydexecutable
MD5:11C5008E0BA2CAA8ADF7452F0AAAFD1E
SHA256:BF63F44951F14C9D0C890415D013276498D6D59E53811BBE2FA16825710BEA14
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\python310.dllexecutable
MD5:384349987B60775D6FC3A6D202C3E1BD
SHA256:F281C2E252ED59DD96726DBB2DE529A2B07B818E9CC3799D1FFA9883E3028ED8
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\libffi-7.dllexecutable
MD5:EEF7981412BE8EA459064D3090F4B3AA
SHA256:F60DD9F2FCBD495674DFC1555EFFB710EB081FC7D4CAE5FA58C438AB50405081
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\libcrypto-1_1.dllexecutable
MD5:63C4F445B6998E63A1414F5765C18217
SHA256:664C3E52F914E351BB8A66CE2465EE0D40ACAB1D2A6B3167AE6ACF6F1D1724D2
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\select.pydexecutable
MD5:78D421A4E6B06B5561C45B9A5C6F86B1
SHA256:F1694CE82DA997FAA89A9D22D469BFC94ABB0F2063A69EC9B953BC085C2CB823
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
20
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.18.121.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.18.121.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4960
RUXIMICS.exe
GET
200
2.18.121.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4960
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
2.18.121.147:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
5944
MoUsoCoreWorker.exe
2.18.121.147:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
4960
RUXIMICS.exe
2.18.121.147:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 2.18.121.147
  • 2.18.121.139
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 13.89.179.14
whitelisted

Threats

No threats detected
No debug info