Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 07:31

General

  • Target

    2024-05-07_7dacc5f705f4773fb1bd5711977b6a4b_ngrbot_snatch.exe

  • Size

    5.4MB

  • MD5

    7dacc5f705f4773fb1bd5711977b6a4b

  • SHA1

    bef4451f4bf5a2c72f3505a282551606c31b94f8

  • SHA256

    f727ddfdf7e802969f8f792e8101ce3f39803fc2e7306f4c93f94f37dce00bc5

  • SHA512

    700d23c17968779b52529047c7c73b7d21f2baf4e81672054ae8b552f37a02ba8be543f51e85a63badc3b5c0567833963b717359c2bb4a2d49a3c1f12f0753a6

  • SSDEEP

    49152:ALkjoWYAUZzhXjF/exacTv4U+SbNmuP30ntABdqju5EsiMllYBNC83OnQlds:AodYAUZz1RYvFNDPEtQ5EsOB+n0s

Malware Config

Extracted

Family

xenorat

C2

69.46.15.141

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-07_7dacc5f705f4773fb1bd5711977b6a4b_ngrbot_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-07_7dacc5f705f4773fb1bd5711977b6a4b_ngrbot_snatch.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Add-MpPreference -ExclusionExtension C:\Users\Admin\AppData\Local\Temp\*.exe
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4828
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4240
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Set-MpPreference -PUAProtection 0
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3652
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4876
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Set-MpPreference -DisableRealtimeMonitoring $true
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1480
    • C:\Windows\system32\cmd.exe
      cmd /C netsh advfirewall set allprofiles state off
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Windows\system32\netsh.exe
        netsh advfirewall set allprofiles state off
        3⤵
        • Modifies Windows Firewall
        PID:3996
    • C:\Users\Admin\AppData\Local\Temp\3483184936.exe
      C:\Users\Admin\AppData\Local\Temp\3483184936.exe
      2⤵
      • Executes dropped EXE
      PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    6d42b6da621e8df5674e26b799c8e2aa

    SHA1

    ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

    SHA256

    5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

    SHA512

    53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    04f1d68afbed6b13399edfae1e9b1472

    SHA1

    8bfdcb687a995e4a63a8c32df2c66dc89f91a8b0

    SHA256

    f358f33a42122e97c489fad7bbc8beab2eb42d42e4ec7fce0dd61fe6d8c0b8de

    SHA512

    30c5e72a8134992094d937d2588f7a503b1d6407d11afe0265b7c8b0ce14071925e5caed13fc4f9c28705df4c7aed3601f81b007048b148af274d7784aa5fb75

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    948B

    MD5

    966914e2e771de7a4a57a95b6ecfa8a9

    SHA1

    7a32282fd51dd032967ed4d9a40cc57e265aeff2

    SHA256

    98d3c70d7004fa807897317bd6cd3e977b9b6c72d4d2565aca0f9f8b1c315cba

    SHA512

    dc39c7124a9c7c8d4c7e8e16290c46360b8d9a8f4e43edaacbbeb09bdcf20159a53db54d2b322372001b6a3de52b2f88e9088b5fdbc7638816ae0d122bb015f5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    948B

    MD5

    dcc3133a2a20a294255a82d2b97c61c7

    SHA1

    53d0acdc354df3f3df9879aaf349cafdd24c12f4

    SHA256

    cf462864912a95f27b59b1f1818a3e615db55646315dc6fb9742d199345ff207

    SHA512

    06c50d23012cc6a84c99ba7c98903d6e379eaf6cc87af67580254a938aaf70d91556fb8efe52f0fa097629591023efb8568e85069a9f1c3a3c8bff463247e8c3

  • C:\Users\Admin\AppData\Local\Temp\3483184936.exe
    Filesize

    232KB

    MD5

    6772b877722ebba58fd8b0bf5d79f2d0

    SHA1

    4eb48543abf3bb0c5e93190f9e6dbea7539144a6

    SHA256

    2f85f94fd67ca5a0d0d6792860ad69bcc2fffe96dea63d48e311a09cee10258f

    SHA512

    ee31a193e103d3d6465417ca28ec8b49c9e07712c1ae0d5eab7b864cb33804c82026b70e54cc812cf0aff62f98b65d2014b93d996a294ad0735b414837481e68

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vvrkl2zv.tpp.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1488-72-0x0000000000DF0000-0x0000000000E30000-memory.dmp
    Filesize

    256KB

  • memory/4240-18-0x00007FFD982B0000-0x00007FFD98D71000-memory.dmp
    Filesize

    10.8MB

  • memory/4240-19-0x00007FFD982B0000-0x00007FFD98D71000-memory.dmp
    Filesize

    10.8MB

  • memory/4240-31-0x00007FFD982B0000-0x00007FFD98D71000-memory.dmp
    Filesize

    10.8MB

  • memory/4828-0-0x00007FFD982B3000-0x00007FFD982B5000-memory.dmp
    Filesize

    8KB

  • memory/4828-16-0x00007FFD982B0000-0x00007FFD98D71000-memory.dmp
    Filesize

    10.8MB

  • memory/4828-15-0x00007FFD982B0000-0x00007FFD98D71000-memory.dmp
    Filesize

    10.8MB

  • memory/4828-12-0x00007FFD982B0000-0x00007FFD98D71000-memory.dmp
    Filesize

    10.8MB

  • memory/4828-11-0x00007FFD982B0000-0x00007FFD98D71000-memory.dmp
    Filesize

    10.8MB

  • memory/4828-1-0x0000013FFE4D0000-0x0000013FFE4F2000-memory.dmp
    Filesize

    136KB

  • memory/4876-54-0x00000215EE2E0000-0x00000215EE4FC000-memory.dmp
    Filesize

    2.1MB