Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 07:45
Behavioral task
behavioral1
Sample
AuthClient.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
AuthClient.exe
Resource
win10v2004-20240226-en
General
-
Target
AuthClient.exe
-
Size
45KB
-
MD5
de382ff81756934ba776279c448a37b1
-
SHA1
de6741ec906099d79b5c430c210725d534b13440
-
SHA256
6185e375599f40eb19cc5464cd33b388e2b42a0dbf065a67bb395757291d5080
-
SHA512
8be70b011694df2b9031c9483170d8191647a86a843f82d083d0ddd67da4baa25137da3334d1582d5bada4f8e6f3b2d3a13db755d293f2d52aca7aff1aaad73c
-
SSDEEP
768:MdhO/poiiUcjlJInSmH9Xqk5nWEZ5SbTDaIuI7CPW5f:Gw+jjgn5H9XqcnW85SbT1uIn
Malware Config
Extracted
xenorat
Vallithebest-32755.portmap.host
Xeno_rat_nd8912d
-
delay
2000
-
install_path
appdata
-
port
32755
-
startup_name
AuthClientV2
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation AuthClient.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 AuthClient.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe 4568 AuthClient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4568 AuthClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4568 AuthClient.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4568 2148 AuthClient.exe 89 PID 2148 wrote to memory of 4568 2148 AuthClient.exe 89 PID 2148 wrote to memory of 4568 2148 AuthClient.exe 89 PID 4568 wrote to memory of 3568 4568 AuthClient.exe 90 PID 4568 wrote to memory of 3568 4568 AuthClient.exe 90 PID 4568 wrote to memory of 3568 4568 AuthClient.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\AuthClient.exe"C:\Users\Admin\AppData\Local\Temp\AuthClient.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\XenoManager\AuthClient.exe"C:\Users\Admin\AppData\Roaming\XenoManager\AuthClient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "AuthClientV2" /XML "C:\Users\Admin\AppData\Local\Temp\tmp614A.tmp" /F3⤵
- Creates scheduled task(s)
PID:3568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD54dd04cfa7ab46782f28022890c1434c0
SHA1c14317c1b75b82a85f3a9782048f8a28e6577ff1
SHA2560ef989b1db3295837b8aa83585eed3193823e1a385ee3fb8c4d762ed22f8b94e
SHA512a574b11af438005021c25ba721d09fca8a081e28c5641b021af85c2a9177fd685884c08e1e29c18b23913dcd7ab200717462f1f5291645448ab5184d5d33db79
-
Filesize
45KB
MD5de382ff81756934ba776279c448a37b1
SHA1de6741ec906099d79b5c430c210725d534b13440
SHA2566185e375599f40eb19cc5464cd33b388e2b42a0dbf065a67bb395757291d5080
SHA5128be70b011694df2b9031c9483170d8191647a86a843f82d083d0ddd67da4baa25137da3334d1582d5bada4f8e6f3b2d3a13db755d293f2d52aca7aff1aaad73c