Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-03-2024 07:36
Behavioral task
behavioral1
Sample
0b4ced1e11fac0306ee8d9411aea4219.exe
Resource
win7-20231129-en
General
-
Target
0b4ced1e11fac0306ee8d9411aea4219.exe
-
Size
45KB
-
MD5
0b4ced1e11fac0306ee8d9411aea4219
-
SHA1
254c74fa4b822381dfb2d258ad77b9935ad619c6
-
SHA256
4edcb51c961470638828b8f48a0259fb4b9645192f0b30e1d79b789c9b4c4d7f
-
SHA512
76d0b8d66a84ac66b6ba6a08ad5e2e9ee1f9893c182b4e1be1f236a69bdbeb91139a1b8936e87eb2fed44627f5afc63a30404e279d840a27e5de0926a7a07eed
-
SSDEEP
768:tdhO/poiiUcjlJInLzo4mH9Xqk5nWEZ5SbTDaoWI7CPW5V:jw+jjgnw4mH9XqcnW85SbTJWId
Malware Config
Extracted
xenorat
217.63.234.90
Xeno_rat_nd8912ddd
-
delay
3500
-
install_path
appdata
-
port
8808
-
startup_name
svchost.exe
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2980 0b4ced1e11fac0306ee8d9411aea4219.exe -
Loads dropped DLL 1 IoCs
pid Process 1964 0b4ced1e11fac0306ee8d9411aea4219.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2980 1964 0b4ced1e11fac0306ee8d9411aea4219.exe 28 PID 1964 wrote to memory of 2980 1964 0b4ced1e11fac0306ee8d9411aea4219.exe 28 PID 1964 wrote to memory of 2980 1964 0b4ced1e11fac0306ee8d9411aea4219.exe 28 PID 1964 wrote to memory of 2980 1964 0b4ced1e11fac0306ee8d9411aea4219.exe 28 PID 2980 wrote to memory of 2592 2980 0b4ced1e11fac0306ee8d9411aea4219.exe 29 PID 2980 wrote to memory of 2592 2980 0b4ced1e11fac0306ee8d9411aea4219.exe 29 PID 2980 wrote to memory of 2592 2980 0b4ced1e11fac0306ee8d9411aea4219.exe 29 PID 2980 wrote to memory of 2592 2980 0b4ced1e11fac0306ee8d9411aea4219.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b4ced1e11fac0306ee8d9411aea4219.exe"C:\Users\Admin\AppData\Local\Temp\0b4ced1e11fac0306ee8d9411aea4219.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Roaming\XenoManager\0b4ced1e11fac0306ee8d9411aea4219.exe"C:\Users\Admin\AppData\Roaming\XenoManager\0b4ced1e11fac0306ee8d9411aea4219.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchost.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF8B.tmp" /F3⤵
- Creates scheduled task(s)
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d685e81a4021b0fdb2a815ea7152e088
SHA126b5ba5236125e919697f5650ce7c09afa1c0984
SHA2563b4c9739dcd5ed1c40bd34d3e4478e93e6136e6700f19b6100cd8130563301ab
SHA51217ec260fa73f78df37c852cf6be32bf7ac314f6370970468c7f9dc05ce879c256303921881aab4734810225da6858b6f4940e76920a30080711d4f71add6f860
-
Filesize
45KB
MD50b4ced1e11fac0306ee8d9411aea4219
SHA1254c74fa4b822381dfb2d258ad77b9935ad619c6
SHA2564edcb51c961470638828b8f48a0259fb4b9645192f0b30e1d79b789c9b4c4d7f
SHA51276d0b8d66a84ac66b6ba6a08ad5e2e9ee1f9893c182b4e1be1f236a69bdbeb91139a1b8936e87eb2fed44627f5afc63a30404e279d840a27e5de0926a7a07eed