Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-04-2024 11:10
Behavioral task
behavioral1
Sample
373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe
Resource
win10v2004-20240412-en
General
-
Target
373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe
-
Size
45KB
-
MD5
a2eea60f1991928460eca53fb86f127b
-
SHA1
b5d31c9b199a9754a3ee7d7b9d35f8a98ed3b340
-
SHA256
373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7
-
SHA512
7e3f2551fa8aebb04ad811613b934af4c930e79b1f743d8ddf0bc6cf92c9fb23f6500e38b315fe7bd59bc582de3c759f7016f51d03aa5fc826eba0c515125876
-
SSDEEP
768:fdhO/poiiUcjlJIni2gH9Xqk5nWEZ5SbTDajuI7CPW5G:Vw+jjgniLH9XqcnW85SbTuuIe
Malware Config
Extracted
xenorat
dentiste.ddns.net
Xeno_syteme_update
-
delay
5000
-
install_path
appdata
-
port
7011
-
startup_name
System
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 652 wrote to memory of 564 652 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 79 PID 652 wrote to memory of 564 652 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 79 PID 652 wrote to memory of 564 652 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 79 PID 564 wrote to memory of 4756 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 81 PID 564 wrote to memory of 4756 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 81 PID 564 wrote to memory of 4756 564 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"C:\Users\Admin\AppData\Local\Temp\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Roaming\XenoManager\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"C:\Users\Admin\AppData\Roaming\XenoManager\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "System" /XML "C:\Users\Admin\AppData\Local\Temp\tmp662C.tmp" /F3⤵
- Creates scheduled task(s)
PID:4756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe.log
Filesize226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
1KB
MD5b91992f69fd33fa0d07a1e70dfbe2eb2
SHA1021e3b94f5751206e90bd432744ca324094b4601
SHA25691a759468382b528e984fac817b1e0c6a2ff6d7b7a2772b0499ce6fcd6f80c28
SHA512005bb11d6087cb41c6b441260bf390888a94bb28bbc9743cc3131ee5f1cf162debedfbe68212296fa1cf78f3bf608d667255985cddf60aaf2796f95a40963e76
-
C:\Users\Admin\AppData\Roaming\XenoManager\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe
Filesize45KB
MD5a2eea60f1991928460eca53fb86f127b
SHA1b5d31c9b199a9754a3ee7d7b9d35f8a98ed3b340
SHA256373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7
SHA5127e3f2551fa8aebb04ad811613b934af4c930e79b1f743d8ddf0bc6cf92c9fb23f6500e38b315fe7bd59bc582de3c759f7016f51d03aa5fc826eba0c515125876