Analysis

  • max time kernel
    126s
  • max time network
    156s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-04-2024 17:41

General

  • Target

    nignig.exe

  • Size

    51KB

  • MD5

    2553697d3450b13cc2d7cd0c65ef609f

  • SHA1

    a6954b0309a0e3cd1186c174beff53e5cbd05e64

  • SHA256

    2967987bc0068a46ec1a2809804780d0ae9e746faf58c2319ca315cf36306c13

  • SHA512

    204b7d0dfc66926935c1a48939c7cc09f2f6eaf87209bf908516bf5faa416f91e9b52d0dcf57c983738c991cd1747475b5f1c6752fa0d3f44cb5a48e46acac73

  • SSDEEP

    768:tivdjHrddilbVauou79Eo32q4XBR2HjBSkGu2yPo+LGZYebFDaxk6RNSgNOU:+pHmVauo3DjRUDj6CSYebFUlf4U

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

centre-clan.gl.at.ply.gg

Mutex

nignig_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    40354

  • startup_name

    discord

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\nignig.exe
    "C:\Users\Admin\AppData\Local\Temp\nignig.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\XenoManager\nignig.exe
      "C:\Users\Admin\AppData\Local\Temp\XenoManager\nignig.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "discord" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF194.tmp" /F
        3⤵
        • Creates scheduled task(s)
        PID:3780
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2368
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2044
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:3204
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3644
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1860
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    PID:3744
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2996
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nignig.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2TT8RSZ7\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\3W6S0IRV\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\XenoManager\nignig.exe

    Filesize

    51KB

    MD5

    2553697d3450b13cc2d7cd0c65ef609f

    SHA1

    a6954b0309a0e3cd1186c174beff53e5cbd05e64

    SHA256

    2967987bc0068a46ec1a2809804780d0ae9e746faf58c2319ca315cf36306c13

    SHA512

    204b7d0dfc66926935c1a48939c7cc09f2f6eaf87209bf908516bf5faa416f91e9b52d0dcf57c983738c991cd1747475b5f1c6752fa0d3f44cb5a48e46acac73

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nl12elk5.yzg.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\tmpF194.tmp

    Filesize

    1KB

    MD5

    648afa83e3dbfbb5b7f97fd39a29f4f7

    SHA1

    fdabd58126c64246501deb458706a5e474eae04d

    SHA256

    106aa526ff18e9713b5f8da66fb27459fdbd3580e9d72372ae0461523fd9eb26

    SHA512

    16eba1b1a5b156f02bf891769f90562a022d1a047bb691cc179716b81cf8776e860ac76f0552a0998afb5e8b73c5490ca0706d04ebd4307be882d993d7af1026

  • memory/1352-507-0x0000000003060000-0x000000000306A000-memory.dmp

    Filesize

    40KB

  • memory/1352-478-0x0000000005DA0000-0x0000000005DAA000-memory.dmp

    Filesize

    40KB

  • memory/1352-17-0x0000000005D80000-0x0000000005D8A000-memory.dmp

    Filesize

    40KB

  • memory/1352-10-0x0000000073470000-0x0000000073B5E000-memory.dmp

    Filesize

    6.9MB

  • memory/1352-11-0x0000000005930000-0x0000000005940000-memory.dmp

    Filesize

    64KB

  • memory/1352-16-0x0000000005930000-0x0000000005940000-memory.dmp

    Filesize

    64KB

  • memory/1352-15-0x0000000073470000-0x0000000073B5E000-memory.dmp

    Filesize

    6.9MB

  • memory/1352-14-0x0000000006330000-0x0000000006396000-memory.dmp

    Filesize

    408KB

  • memory/1352-476-0x0000000001370000-0x000000000137A000-memory.dmp

    Filesize

    40KB

  • memory/1352-477-0x0000000005F00000-0x0000000005F92000-memory.dmp

    Filesize

    584KB

  • memory/1412-9-0x0000000073470000-0x0000000073B5E000-memory.dmp

    Filesize

    6.9MB

  • memory/1412-1-0x0000000073470000-0x0000000073B5E000-memory.dmp

    Filesize

    6.9MB

  • memory/1412-0-0x0000000000520000-0x0000000000534000-memory.dmp

    Filesize

    80KB

  • memory/1860-369-0x000002E37A540000-0x000002E37A640000-memory.dmp

    Filesize

    1024KB

  • memory/2044-482-0x0000026614D70000-0x0000026614D71000-memory.dmp

    Filesize

    4KB

  • memory/2044-483-0x0000026614D80000-0x0000026614D81000-memory.dmp

    Filesize

    4KB

  • memory/2044-359-0x000002660B2D0000-0x000002660B2D2000-memory.dmp

    Filesize

    8KB

  • memory/2044-340-0x000002660DD20000-0x000002660DD30000-memory.dmp

    Filesize

    64KB

  • memory/2368-285-0x000000000A710000-0x000000000A72A000-memory.dmp

    Filesize

    104KB

  • memory/2368-45-0x00000000096C0000-0x00000000096FC000-memory.dmp

    Filesize

    240KB

  • memory/2368-91-0x000000000A590000-0x000000000A635000-memory.dmp

    Filesize

    660KB

  • memory/2368-92-0x000000000A7B0000-0x000000000A844000-memory.dmp

    Filesize

    592KB

  • memory/2368-85-0x000000006FD70000-0x00000000700C0000-memory.dmp

    Filesize

    3.3MB

  • memory/2368-290-0x000000000A6F0000-0x000000000A6F8000-memory.dmp

    Filesize

    32KB

  • memory/2368-309-0x0000000008A90000-0x0000000008AAA000-memory.dmp

    Filesize

    104KB

  • memory/2368-310-0x000000000A880000-0x000000000A8A2000-memory.dmp

    Filesize

    136KB

  • memory/2368-311-0x000000000ADB0000-0x000000000B2AE000-memory.dmp

    Filesize

    5.0MB

  • memory/2368-84-0x000000006FD20000-0x000000006FD6B000-memory.dmp

    Filesize

    300KB

  • memory/2368-83-0x000000000A550000-0x000000000A583000-memory.dmp

    Filesize

    204KB

  • memory/2368-76-0x0000000009780000-0x00000000097F6000-memory.dmp

    Filesize

    472KB

  • memory/2368-20-0x0000000004DB0000-0x0000000004DE6000-memory.dmp

    Filesize

    216KB

  • memory/2368-21-0x00000000079D0000-0x0000000007FF8000-memory.dmp

    Filesize

    6.2MB

  • memory/2368-22-0x0000000007830000-0x0000000007852000-memory.dmp

    Filesize

    136KB

  • memory/2368-23-0x00000000078D0000-0x0000000007936000-memory.dmp

    Filesize

    408KB

  • memory/2368-24-0x00000000081E0000-0x0000000008530000-memory.dmp

    Filesize

    3.3MB

  • memory/2368-25-0x00000000085D0000-0x00000000085EC000-memory.dmp

    Filesize

    112KB

  • memory/2368-26-0x0000000008B00000-0x0000000008B4B000-memory.dmp

    Filesize

    300KB

  • memory/2368-86-0x000000000A530000-0x000000000A54E000-memory.dmp

    Filesize

    120KB

  • memory/2996-422-0x000001DC2C720000-0x000001DC2C740000-memory.dmp

    Filesize

    128KB

  • memory/2996-423-0x000001DC2C9A0000-0x000001DC2CAA0000-memory.dmp

    Filesize

    1024KB

  • memory/2996-428-0x000001DC3E960000-0x000001DC3E980000-memory.dmp

    Filesize

    128KB

  • memory/2996-426-0x000001DC3F0F0000-0x000001DC3F1F0000-memory.dmp

    Filesize

    1024KB

  • memory/2996-458-0x000001DC3EA90000-0x000001DC3EAB0000-memory.dmp

    Filesize

    128KB

  • memory/3744-379-0x000001AD3A310000-0x000001AD3A312000-memory.dmp

    Filesize

    8KB

  • memory/3744-377-0x000001AD3A2D0000-0x000001AD3A2D2000-memory.dmp

    Filesize

    8KB

  • memory/3744-381-0x000001AD3A370000-0x000001AD3A372000-memory.dmp

    Filesize

    8KB

  • memory/3744-383-0x000001AD3A390000-0x000001AD3A392000-memory.dmp

    Filesize

    8KB

  • memory/3744-385-0x000001AD3A3B0000-0x000001AD3A3B2000-memory.dmp

    Filesize

    8KB

  • memory/3744-387-0x000001AD3A3D0000-0x000001AD3A3D2000-memory.dmp

    Filesize

    8KB

  • memory/3744-373-0x000001AD292A0000-0x000001AD293A0000-memory.dmp

    Filesize

    1024KB

  • memory/3744-372-0x000001AD292A0000-0x000001AD293A0000-memory.dmp

    Filesize

    1024KB