Malware Analysis Report

2024-08-06 18:36

Sample ID 240515-b1f17abc63
Target 8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
SHA256 8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9
Tags
xenorat rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9

Threat Level: Known bad

The file 8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe was found to be: Known bad.

Malicious Activity Summary

xenorat rat trojan

XenorRat

Detects executables packed with ConfuserEx Mod

Detects executables packed with ConfuserEx Mod

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Program crash

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-15 01:36

Signatures

Detects executables packed with ConfuserEx Mod

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 01:36

Reported

2024-05-15 01:39

Platform

win7-20231129-en

Max time kernel

148s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe"

Signatures

XenorRat

trojan rat xenorat

Detects executables packed with ConfuserEx Mod

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2040 set thread context of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 set thread context of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 set thread context of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 set thread context of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 set thread context of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 set thread context of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2040 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2040 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2396 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2396 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2396 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2396 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2636 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 2668 wrote to memory of 2788 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Windows\SysWOW64\schtasks.exe
PID 2668 wrote to memory of 2788 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Windows\SysWOW64\schtasks.exe
PID 2668 wrote to memory of 2788 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Windows\SysWOW64\schtasks.exe
PID 2668 wrote to memory of 2788 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

"C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe"

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

"C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe"

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "bns" /XML "C:\Users\Admin\AppData\Local\Temp\tmp454.tmp" /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 dns.dobiamfollollc.online udp
NL 94.156.68.125:1283 dns.dobiamfollollc.online tcp
NL 94.156.68.125:1283 dns.dobiamfollollc.online tcp
NL 94.156.68.125:1283 dns.dobiamfollollc.online tcp

Files

memory/2040-0-0x00000000740BE000-0x00000000740BF000-memory.dmp

memory/2040-1-0x0000000000150000-0x0000000000196000-memory.dmp

memory/2040-2-0x0000000000250000-0x0000000000256000-memory.dmp

memory/2040-3-0x00000000004F0000-0x0000000000530000-memory.dmp

memory/2040-4-0x00000000740B0000-0x000000007479E000-memory.dmp

memory/2040-5-0x0000000000380000-0x0000000000386000-memory.dmp

memory/2396-7-0x0000000000400000-0x0000000000412000-memory.dmp

memory/2396-12-0x0000000000400000-0x0000000000412000-memory.dmp

memory/2396-9-0x0000000000400000-0x0000000000412000-memory.dmp

memory/2396-15-0x00000000740B0000-0x000000007479E000-memory.dmp

memory/2040-16-0x00000000740B0000-0x000000007479E000-memory.dmp

\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

MD5 2bad7cb7d57cae21a1d45344ad5600c5
SHA1 d680e5a796951f3221c7691ec9dacca28149c195
SHA256 8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9
SHA512 37afa118242b6a52efb2aab633bdffd67171bf14fdef30c50f53041caf3ff00f1b845b43c09ecf9153339235add15cfb541eb8e8610f0558814cc1f5967a22b3

memory/2396-24-0x00000000740B0000-0x000000007479E000-memory.dmp

memory/2636-23-0x00000000009B0000-0x00000000009F6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp454.tmp

MD5 bd17fa25756bd3456ba3a6a8e444e811
SHA1 45ad20ad0d2b3808fe76077ff0e6c5e7eec986c7
SHA256 e1bb7e4696d1c7bfac6c69ec50e7bc28eee2ae24e69704946dc18745a15d71c9
SHA512 d71fc9cda59bdd31739a58af9feacb6a7123be7956f7ec54a46009c5bad7b72e77f5e66cf9e5e6e9b4e10d774f4c66b8fa126805e2b9e72d4ab4dc7a6495208f

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 01:36

Reported

2024-05-15 01:39

Platform

win10v2004-20240426-en

Max time kernel

148s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe"

Signatures

XenorRat

trojan rat xenorat

Detects executables packed with ConfuserEx Mod

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 964 set thread context of 736 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 set thread context of 1728 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 set thread context of 3952 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 set thread context of 2836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 set thread context of 4448 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 set thread context of 824 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 964 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 3952 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 3952 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 3952 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 3952 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 3952 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 3952 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 3952 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 964 wrote to memory of 3952 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 1728 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 1728 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 1728 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 824 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 824 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 824 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 824 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 824 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 824 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 824 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 4328 wrote to memory of 824 N/A C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe
PID 736 wrote to memory of 3596 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Windows\SysWOW64\schtasks.exe
PID 736 wrote to memory of 3596 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Windows\SysWOW64\schtasks.exe
PID 736 wrote to memory of 3596 N/A C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

"C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe"

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Local\Temp\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

"C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe"

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4448 -ip 4448

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 80

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "bns" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6915.tmp" /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
BE 88.221.83.187:443 www.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 187.83.221.88.in-addr.arpa udp
BE 88.221.83.187:443 www.bing.com tcp
US 8.8.8.8:53 138.201.86.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 31.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 dns.dobiamfollollc.online udp
NL 94.156.68.125:1283 dns.dobiamfollollc.online tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
NL 94.156.68.125:1283 dns.dobiamfollollc.online tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
NL 94.156.68.125:1283 dns.dobiamfollollc.online tcp

Files

memory/964-0-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

memory/964-1-0x0000000000820000-0x0000000000866000-memory.dmp

memory/964-2-0x0000000002C60000-0x0000000002C66000-memory.dmp

memory/964-3-0x0000000005250000-0x0000000005290000-memory.dmp

memory/964-4-0x0000000074E20000-0x00000000755D0000-memory.dmp

memory/964-5-0x000000000DEB0000-0x000000000DF4C000-memory.dmp

memory/964-6-0x000000000E500000-0x000000000EAA4000-memory.dmp

memory/964-7-0x000000000DF50000-0x000000000DFE2000-memory.dmp

memory/964-8-0x0000000004D20000-0x0000000004D26000-memory.dmp

memory/736-9-0x0000000000400000-0x0000000000412000-memory.dmp

memory/736-13-0x0000000074E20000-0x00000000755D0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe.log

MD5 d95c58e609838928f0f49837cab7dfd2
SHA1 55e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA256 0407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512 405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d

memory/1728-17-0x0000000074E20000-0x00000000755D0000-memory.dmp

memory/964-16-0x0000000074E20000-0x00000000755D0000-memory.dmp

memory/736-21-0x0000000074E20000-0x00000000755D0000-memory.dmp

C:\Users\Admin\AppData\Roaming\XenoManager\8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9.exe

MD5 2bad7cb7d57cae21a1d45344ad5600c5
SHA1 d680e5a796951f3221c7691ec9dacca28149c195
SHA256 8eb8ebe00262f74321167beca9e51f62add06e4460e2f274f857e3d7664cb9a9
SHA512 37afa118242b6a52efb2aab633bdffd67171bf14fdef30c50f53041caf3ff00f1b845b43c09ecf9153339235add15cfb541eb8e8610f0558814cc1f5967a22b3

memory/1728-29-0x0000000074E20000-0x00000000755D0000-memory.dmp

memory/736-36-0x0000000074E20000-0x00000000755D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp6915.tmp

MD5 e06511e8ffe2ab1a443a574170c460f0
SHA1 1a7ef95fadeab457601ed542e8dfd5041d8236ff
SHA256 0ee3be48ef23b1278a732559a7ef505492b8eded462909043f8575e480e4515e
SHA512 f98b9cd0488dcfab8785877d137c91557ca6cca134e96043da910e18d423695bb431415006d0ca964733d111c84e8c56c1f46437e7db19395fc25870551848ee