File name:

XenoxBuildAsos.exe

Full analysis: https://app.any.run/tasks/ba25e540-dfe5-439b-b509-b4557dee6d96
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: June 21, 2025, 21:19:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
trox
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

4CD6D5DF34E890985869429ADE6A82EA

SHA1:

CEE29A8CB4EF6C02FF592D40815C328B6D322CAA

SHA256:

97673752A3ABAA81AECD6B3296D94F436D9475B59B404241F78588965F0ECED7

SSDEEP:

98304:1vJJfcllsZU5iRVGXk6f8nXCB5ldV2sy8i79gv2NJQxHxial0w3FFG8rL7asLlT2:ZFExkqro7i50QNy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • TROX has been detected

      • XenoxBuildAsos.exe (PID: 1944)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • XenoxBuildAsos.exe (PID: 1944)
    • Process drops python dynamic module

      • XenoxBuildAsos.exe (PID: 1944)
    • Process drops legitimate windows executable

      • XenoxBuildAsos.exe (PID: 1944)
    • The process drops C-runtime libraries

      • XenoxBuildAsos.exe (PID: 1944)
    • Loads Python modules

      • gUTwW9T2iuD5ypB5khYp-obf.exe (PID: 5960)
    • Reads security settings of Internet Explorer

      • XenoxBuildAsos.exe (PID: 1944)
  • INFO

    • Checks supported languages

      • XenoxBuildAsos.exe (PID: 1944)
      • gUTwW9T2iuD5ypB5khYp-obf.exe (PID: 5960)
    • Create files in a temporary directory

      • XenoxBuildAsos.exe (PID: 1944)
    • The sample compiled with english language support

      • XenoxBuildAsos.exe (PID: 1944)
    • Reads the machine GUID from the registry

      • gUTwW9T2iuD5ypB5khYp-obf.exe (PID: 5960)
    • Reads the computer name

      • gUTwW9T2iuD5ypB5khYp-obf.exe (PID: 5960)
      • XenoxBuildAsos.exe (PID: 1944)
    • Checks proxy server information

      • slui.exe (PID: 640)
    • Reads the software policy settings

      • slui.exe (PID: 640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:03:02 03:58:00+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.34
CodeSize: 126464
InitializedDataSize: 61952
UninitializedDataSize: -
EntryPoint: 0xb934
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #TROX xenoxbuildasos.exe gutww9t2iud5ypb5khyp-obf.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
640C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1944"C:\Users\admin\Desktop\XenoxBuildAsos.exe" C:\Users\admin\Desktop\XenoxBuildAsos.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\xenoxbuildasos.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
5960"C:\Users\admin\Desktop\XenoxBuildAsos.exe" C:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\gUTwW9T2iuD5ypB5khYp-obf.exeXenoxBuildAsos.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\onefile_1944_133950143572638174\gutww9t2iud5ypb5khyp-obf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\temp\onefile_1944_133950143572638174\python310.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
Total events
4 038
Read events
4 038
Write events
0
Delete events
0

Modification events

No data
Executable files
19
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\gUTwW9T2iuD5ypB5khYp-obf.exeexecutable
MD5:08E2C2CC6E21B150D61C89889F67A042
SHA256:64F6DDF6F0E7A6BBAA0FF19543C811DCB5A1DC05A8F1A811E6DFA59F9281267D
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_elementtree.pydexecutable
MD5:1FECAC327FC93FC161833AD709336BBB
SHA256:16480EDE0430BE5249481A9BFB843EB0EF98F93B467A5428352FC23CC8C9051D
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_decimal.pydexecutable
MD5:1CDD7239FC63B7C8A2E2BC0A08D9EA76
SHA256:384993B2B8CFCBF155E63F0EE2383A9F9483DE92AB73736FF84590A0C4CA2690
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_hashlib.pydexecutable
MD5:CFB9E0A73A6C9D6D35C2594E52E15234
SHA256:50DAEB3985302A8D85CE8167B0BF08B9DA43E7D51CEAE50E8E1CDFB0EDF218C6
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_socket.pydexecutable
MD5:5DD51579FA9B6A06336854889562BEC0
SHA256:3669E56E99AE3A944FBE7845F0BE05AEA96A603717E883D56A27DC356F8C2F2C
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_bz2.pydexecutable
MD5:B45E82A398713163216984F2FEBA88F6
SHA256:4C2649DC69A8874B91646723AACB84C565EFEAA4277C46392055BCA9A10497A8
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_ctypes.pydexecutable
MD5:79F339753DC8954B8EB45FE70910937E
SHA256:35CDD122679041EBEF264DE5626B7805F3F66C8AE6CC451B8BC520BE647FA007
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_ssl.pydexecutable
MD5:11C5008E0BA2CAA8ADF7452F0AAAFD1E
SHA256:BF63F44951F14C9D0C890415D013276498D6D59E53811BBE2FA16825710BEA14
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\libssl-1_1.dllexecutable
MD5:BD857F444EBBF147A8FCD1215EFE79FC
SHA256:B7C0E42C1A60A2A062B899C8D4EBD0C50EF956177BA21785CE07C517C143AEAF
1944XenoxBuildAsos.exeC:\Users\admin\AppData\Local\Temp\onefile_1944_133950143572638174\_uuid.pydexecutable
MD5:AEEAD50876DDB63CB8E882989041D7DA
SHA256:C74AAEEC487457139B47C0AB56E01922BFAE6DEBEF562800E5B9B6BAF1EC9D6A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
20
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.18.121.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4960
RUXIMICS.exe
GET
200
2.18.121.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.18.121.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4960
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
2.18.121.147:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
5944
MoUsoCoreWorker.exe
2.18.121.147:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
4960
RUXIMICS.exe
2.18.121.147:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 2.18.121.147
  • 2.18.121.139
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 13.89.179.14
whitelisted

Threats

No threats detected
No debug info