Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 07:23
Behavioral task
behavioral1
Sample
373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe
Resource
win7-20240221-en
General
-
Target
373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe
-
Size
45KB
-
MD5
a2eea60f1991928460eca53fb86f127b
-
SHA1
b5d31c9b199a9754a3ee7d7b9d35f8a98ed3b340
-
SHA256
373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7
-
SHA512
7e3f2551fa8aebb04ad811613b934af4c930e79b1f743d8ddf0bc6cf92c9fb23f6500e38b315fe7bd59bc582de3c759f7016f51d03aa5fc826eba0c515125876
-
SSDEEP
768:fdhO/poiiUcjlJIni2gH9Xqk5nWEZ5SbTDajuI7CPW5G:Vw+jjgniLH9XqcnW85SbTuuIe
Malware Config
Extracted
xenorat
dentiste.ddns.net
Xeno_syteme_update
-
delay
5000
-
install_path
appdata
-
port
7011
-
startup_name
System
Signatures
-
Detects XenoRAT malware 3 IoCs
XenoRAT is an open-source remote access tool (RAT) developed in C#.
resource yara_rule behavioral1/memory/2872-0-0x0000000000380000-0x0000000000392000-memory.dmp XenoRAT behavioral1/files/0x000a000000015cb6-4.dat XenoRAT behavioral1/memory/3044-9-0x00000000012F0000-0x0000000001302000-memory.dmp XenoRAT -
Executes dropped EXE 1 IoCs
pid Process 3044 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2528 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3044 2872 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 28 PID 2872 wrote to memory of 3044 2872 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 28 PID 2872 wrote to memory of 3044 2872 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 28 PID 2872 wrote to memory of 3044 2872 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 28 PID 3044 wrote to memory of 2528 3044 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 29 PID 3044 wrote to memory of 2528 3044 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 29 PID 3044 wrote to memory of 2528 3044 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 29 PID 3044 wrote to memory of 2528 3044 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"C:\Users\Admin\AppData\Local\Temp\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\XenoManager\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"C:\Users\Admin\AppData\Roaming\XenoManager\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "System" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3488.tmp" /F3⤵
- Creates scheduled task(s)
PID:2528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b91992f69fd33fa0d07a1e70dfbe2eb2
SHA1021e3b94f5751206e90bd432744ca324094b4601
SHA25691a759468382b528e984fac817b1e0c6a2ff6d7b7a2772b0499ce6fcd6f80c28
SHA512005bb11d6087cb41c6b441260bf390888a94bb28bbc9743cc3131ee5f1cf162debedfbe68212296fa1cf78f3bf608d667255985cddf60aaf2796f95a40963e76
-
\Users\Admin\AppData\Roaming\XenoManager\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe
Filesize45KB
MD5a2eea60f1991928460eca53fb86f127b
SHA1b5d31c9b199a9754a3ee7d7b9d35f8a98ed3b340
SHA256373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7
SHA5127e3f2551fa8aebb04ad811613b934af4c930e79b1f743d8ddf0bc6cf92c9fb23f6500e38b315fe7bd59bc582de3c759f7016f51d03aa5fc826eba0c515125876