Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2024 16:50
Behavioral task
behavioral1
Sample
AuthClient.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
AuthClient.exe
Resource
win10v2004-20240226-en
General
-
Target
AuthClient.exe
-
Size
45KB
-
MD5
9f3540bc47fad7d3e44b77bd7d393cb9
-
SHA1
75a3c191551c6e2383a889e19944999dcaca082e
-
SHA256
13f183db5e4f7cbdef0673b81f35e99b712c08c6c545152ab0f8ee1ac140a8b5
-
SHA512
465a5b0f1ddaee38fd5c28cbcc9d69489146a816d3420ed1a7ea2c0f0816b0f9a0b8f40fe88680af324404ed97db95ad8e236d06a2ea144d1c5fc8791f7226c7
-
SSDEEP
768:7dhO/poiiUcjlJInkwH9Xqk5nWEZ5SbTDaHWI7CPW5p:pw+jjgnFH9XqcnW85SbTOWIh
Malware Config
Extracted
xenorat
Vallithebest-32755.portmap.host
Xeno_rat_nd8912d
-
delay
2000
-
install_path
temp
-
port
32755
-
startup_name
AuthClient
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation AuthClient.exe -
Executes dropped EXE 1 IoCs
pid Process 4068 AuthClient.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4156 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe 4068 AuthClient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4068 AuthClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4068 AuthClient.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3100 wrote to memory of 4068 3100 AuthClient.exe 90 PID 3100 wrote to memory of 4068 3100 AuthClient.exe 90 PID 3100 wrote to memory of 4068 3100 AuthClient.exe 90 PID 4068 wrote to memory of 4156 4068 AuthClient.exe 94 PID 4068 wrote to memory of 4156 4068 AuthClient.exe 94 PID 4068 wrote to memory of 4156 4068 AuthClient.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\AuthClient.exe"C:\Users\Admin\AppData\Local\Temp\AuthClient.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\AuthClient.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\AuthClient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "AuthClient" /XML "C:\Users\Admin\AppData\Local\Temp\tmp43FE.tmp" /F3⤵
- Creates scheduled task(s)
PID:4156
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD59f3540bc47fad7d3e44b77bd7d393cb9
SHA175a3c191551c6e2383a889e19944999dcaca082e
SHA25613f183db5e4f7cbdef0673b81f35e99b712c08c6c545152ab0f8ee1ac140a8b5
SHA512465a5b0f1ddaee38fd5c28cbcc9d69489146a816d3420ed1a7ea2c0f0816b0f9a0b8f40fe88680af324404ed97db95ad8e236d06a2ea144d1c5fc8791f7226c7
-
Filesize
1KB
MD59d60ef385e8562d61fef048cc05ad99f
SHA11f752c67fd59dfe50e2f7b06d3109a7a6d3a6270
SHA2568d53562b932443a99514ff45ffa0be0b542638327c1b8c8f09553064517733c8
SHA512e7145d9fc1866469c0a3ca494a89bcd08641810d816944ee45356465833df55e3d0a5dfb88e285d51d927943f6db9b3811fc11331c546432ba90f997c20bb37f