Analysis Overview
SHA256
e29b6f39017aebfd1768cd55ca32c93247e95c17cea77fb3ee68368d89aecf71
Threat Level: Known bad
The file valochesse.exe was found to be: Known bad.
Malicious Activity Summary
XenorRat
Xenorat family
Executes dropped EXE
Legitimate hosting services abused for malware hosting/C2
Enumerates physical storage devices
Unsigned PE
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-15 16:07
Signatures
Xenorat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-15 16:07
Reported
2024-05-15 16:10
Platform
win10-20240404-en
Max time kernel
129s
Max time network
135s
Command Line
Signatures
XenorRat
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\valochesse.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 2.tcp.eu.ngrok.io | N/A | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\valochesse.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\valochesse.exe
"C:\Users\Admin\AppData\Local\Temp\valochesse.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\valochesse.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\valochesse.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "tapware" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDE0C.tmp" /F
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /query /v /fo csv
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /delete /tn "\tapware" /f
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Roaming\XenoManager\valochesse.exe"
C:\Windows\SysWOW64\choice.exe
choice /C Y /N /D Y /T 3
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 2.tcp.eu.ngrok.io | udp |
| DE | 18.197.239.5:19034 | 2.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 5.239.197.18.in-addr.arpa | udp |
| DE | 18.197.239.5:19034 | 2.tcp.eu.ngrok.io | tcp |
| DE | 18.197.239.5:19034 | 2.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 18.173.189.20.in-addr.arpa | udp |
Files
memory/2776-0-0x000000007395E000-0x000000007395F000-memory.dmp
memory/2776-1-0x00000000003C0000-0x00000000003D2000-memory.dmp
C:\Users\Admin\AppData\Roaming\XenoManager\valochesse.exe
| MD5 | 804fd6f013a48648f5d2232bca5bdb22 |
| SHA1 | b2e90724822c99e3b761e79990af49e824e2b76a |
| SHA256 | e29b6f39017aebfd1768cd55ca32c93247e95c17cea77fb3ee68368d89aecf71 |
| SHA512 | 86c1d6e032ccee7d8076430f44fe20ba773c064e57d1b3cd07096438989b68c8814be3f375a450202f7eca949d441474e91ccddbb37e17e690e22aac7353c025 |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\valochesse.exe.log
| MD5 | 957779c42144282d8cd83192b8fbc7cf |
| SHA1 | de83d08d2cca06b9ff3d1ef239d6b60b705d25fe |
| SHA256 | 0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51 |
| SHA512 | f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd |
memory/2456-9-0x0000000073950000-0x000000007403E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpDE0C.tmp
| MD5 | 83ea5bae1b54e68e477655caab346750 |
| SHA1 | e5e75e863cb4cf2e5f1957e0be078f243c047f39 |
| SHA256 | 3d56ac0067ccb6684f6980f72aa8cd2af395cf17f536549316d414b4712b0791 |
| SHA512 | e78649f8140fdcbb0f9875d0321ebe0e7cc3f4b28bfe82196f8c7ede5bc08e20a6c90ebd9dc0f8bbf01929c186fe6a62a547eea63de0269980ff3189fe3c921a |
memory/2456-12-0x0000000006170000-0x00000000061D6000-memory.dmp
memory/2456-13-0x0000000073950000-0x000000007403E000-memory.dmp
memory/2456-14-0x0000000073950000-0x000000007403E000-memory.dmp
memory/2456-15-0x0000000073950000-0x000000007403E000-memory.dmp