Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 01:52

General

  • Target

    2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe

  • Size

    5.4MB

  • MD5

    5b9731dc85c4c73f4fcc491a17d57fcd

  • SHA1

    24699fcc2df32502e959a6f918190eb1b9241319

  • SHA256

    a704f907107e0208de4b35e93e6d435dc54fd8f28c87c84250502a2dfa5b5738

  • SHA512

    1d0261bc229c2e8ebe3372ef6abcaf9fbe96162d8853c0b9f3c36ab77ebf3d844924d1c5571bd5b4017e227f01ca05985d6b48c4e23d41d59903d0e5ed0502b8

  • SSDEEP

    49152:xcIa7C33IJszhP0o/eiY9iCl3miEcUD9HTxTju5EFhoRvE9Zz:qa33IGNPaiCUu0duEFSR

Malware Config

Extracted

Family

xenorat

C2

69.46.15.141

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    nothingset

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Add-MpPreference -ExclusionExtension C:\Users\Admin\AppData\Local\Temp\*.exe
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4984
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3252
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Set-MpPreference -PUAProtection 0
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2788
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3276
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Set-MpPreference -DisableRealtimeMonitoring $true
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4776
    • C:\Windows\system32\cmd.exe
      cmd /C netsh advfirewall set allprofiles state off
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\Windows\system32\netsh.exe
        netsh advfirewall set allprofiles state off
        3⤵
        • Modifies Windows Firewall
        PID:2532
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Local\Temp\2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe
      2⤵
      • Views/modifies file attributes
      PID:1076
    • C:\Users\Admin\AppData\Local\Temp\2431936813.exe
      C:\Users\Admin\AppData\Local\Temp\2431936813.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Users\Admin\AppData\Roaming\XenoManager\2431936813.exe
        "C:\Users\Admin\AppData\Roaming\XenoManager\2431936813.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4232
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB46B.tmp" /F
          4⤵
          • Creates scheduled task(s)
          PID:3724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2431936813.exe.log
    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    77d622bb1a5b250869a3238b9bc1402b

    SHA1

    d47f4003c2554b9dfc4c16f22460b331886b191b

    SHA256

    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

    SHA512

    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    dbb904188a321994906abe152659c567

    SHA1

    1a131923372bab101ca002c35544858fe3e2370c

    SHA256

    ccd43cc5dbdd2dc786bdd89460c11ea5f55b4e8389b98e0bcd6400f614fe9d04

    SHA512

    37cbba09369d94ce3d9852503c50a1cdc14a5646d8b4fdeca9bffd3d9284d8e0ceb2801ba458fdddf762f1a4058c5781d0a2f95452d3f7302e42abc5920238ef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    948B

    MD5

    104f4faa257e15000d7abef040cf0af3

    SHA1

    2e3e7c3e47ad83ee6fe089d5bbc4f200f2de995e

    SHA256

    1067119e5f3b3fff60d79e29edf0a2345534469114b49185533d9c65b0af2d05

    SHA512

    45e11a709256ebfa694f6cfcaf88cb52ef60c4e84016fb37fbdc2e8761fd1eadbfa91881011e804e52dfe33986bd0a3104e1a643d05db7c029f6fa3fa0ab3088

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    948B

    MD5

    bdc0c67993f3d7ee47cf0765eed8b315

    SHA1

    613f67e1441b9be51fa0c0c80cde0ee583e9bab9

    SHA256

    7619e5f3aff33b8f08cf21b316c7f7d31b5581c8fe2aed48aac0c78a875dc18e

    SHA512

    f43af2065141e7a4ded5aac2492fa5f56488f16d21ea25d89ea08181f727a03bf613894036ef30643c23747141f8b01dec96a305d8737bfa416c47e9737f0df8

  • C:\Users\Admin\AppData\Local\Temp\2431936813.exe
    Filesize

    69KB

    MD5

    6bc7ab284910610872d47f9cf42a8d55

    SHA1

    0e774a524c0a4043c7988edef661ff9902fcceef

    SHA256

    aa46487f9722d672ebcbdbd473d175ebe2608b5ac9cea822f33661fc43fa7cfc

    SHA512

    97eb72a54a4a1c98a0338b77e12d9101bdf2b717ef345f9fe9c2e67066b94cbea48ede706a8995900fbd0e9ca42f27f7e2bbb676c6fbd427e9e9c6a01f152915

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_talq053y.ltw.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmpB46B.tmp
    Filesize

    1KB

    MD5

    19abcdbaa818936bfd4d03cc70ba9b82

    SHA1

    58788e09aaecd44ebccda3a9accd76401413c411

    SHA256

    b9c28b0ceedaa5725be43f201940d4d4602ed8f1df4b4120335bc1a05526762e

    SHA512

    aad21fa677663957d29976001d3e16bf827a441ff881f4fec187737e50010e5db6ad39d2165982034bd36661a462e2820bbbab377e3732d7be7a4a9ad76360f0

  • memory/1208-71-0x0000000000070000-0x0000000000088000-memory.dmp
    Filesize

    96KB

  • memory/3252-27-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp
    Filesize

    10.8MB

  • memory/3252-31-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp
    Filesize

    10.8MB

  • memory/3252-29-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp
    Filesize

    10.8MB

  • memory/3252-28-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp
    Filesize

    10.8MB

  • memory/4984-0-0x00007FFD5DB13000-0x00007FFD5DB15000-memory.dmp
    Filesize

    8KB

  • memory/4984-15-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp
    Filesize

    10.8MB

  • memory/4984-12-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp
    Filesize

    10.8MB

  • memory/4984-11-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp
    Filesize

    10.8MB

  • memory/4984-1-0x000001B067750000-0x000001B067772000-memory.dmp
    Filesize

    136KB