Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 07:23
Behavioral task
behavioral1
Sample
373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe
Resource
win7-20240221-en
General
-
Target
373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe
-
Size
45KB
-
MD5
a2eea60f1991928460eca53fb86f127b
-
SHA1
b5d31c9b199a9754a3ee7d7b9d35f8a98ed3b340
-
SHA256
373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7
-
SHA512
7e3f2551fa8aebb04ad811613b934af4c930e79b1f743d8ddf0bc6cf92c9fb23f6500e38b315fe7bd59bc582de3c759f7016f51d03aa5fc826eba0c515125876
-
SSDEEP
768:fdhO/poiiUcjlJIni2gH9Xqk5nWEZ5SbTDajuI7CPW5G:Vw+jjgniLH9XqcnW85SbTuuIe
Malware Config
Extracted
xenorat
dentiste.ddns.net
Xeno_syteme_update
-
delay
5000
-
install_path
appdata
-
port
7011
-
startup_name
System
Signatures
-
Detects XenoRAT malware 3 IoCs
XenoRAT is an open-source remote access tool (RAT) developed in C#.
resource yara_rule behavioral2/memory/3592-0-0x00000000000B0000-0x00000000000C2000-memory.dmp XenoRAT behavioral2/files/0x0006000000023276-6.dat XenoRAT behavioral2/memory/2140-21-0x0000000005340000-0x0000000005350000-memory.dmp XenoRAT -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2032 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2140 3592 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 85 PID 3592 wrote to memory of 2140 3592 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 85 PID 3592 wrote to memory of 2140 3592 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 85 PID 2140 wrote to memory of 2032 2140 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 90 PID 2140 wrote to memory of 2032 2140 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 90 PID 2140 wrote to memory of 2032 2140 373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"C:\Users\Admin\AppData\Local\Temp\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Roaming\XenoManager\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"C:\Users\Admin\AppData\Roaming\XenoManager\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "System" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4333.tmp" /F3⤵
- Creates scheduled task(s)
PID:2032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5b91992f69fd33fa0d07a1e70dfbe2eb2
SHA1021e3b94f5751206e90bd432744ca324094b4601
SHA25691a759468382b528e984fac817b1e0c6a2ff6d7b7a2772b0499ce6fcd6f80c28
SHA512005bb11d6087cb41c6b441260bf390888a94bb28bbc9743cc3131ee5f1cf162debedfbe68212296fa1cf78f3bf608d667255985cddf60aaf2796f95a40963e76
-
C:\Users\Admin\AppData\Roaming\XenoManager\373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7.exe
Filesize45KB
MD5a2eea60f1991928460eca53fb86f127b
SHA1b5d31c9b199a9754a3ee7d7b9d35f8a98ed3b340
SHA256373c2274f9add075ba56475a4ac45a313b118fbf88c2025923870c25e794a1a7
SHA5127e3f2551fa8aebb04ad811613b934af4c930e79b1f743d8ddf0bc6cf92c9fb23f6500e38b315fe7bd59bc582de3c759f7016f51d03aa5fc826eba0c515125876