Analysis Overview
SHA256
f028a4628d7d5156c4f841ebaf32ac8ee1287c18bb44c3517b402e871faa1eb0
Threat Level: Known bad
The file XenoRat.exe was found to be: Known bad.
Malicious Activity Summary
XenorRat
Xenorat family
Checks computer location settings
Enumerates physical storage devices
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Creates scheduled task(s)
Modifies data under HKEY_USERS
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-29 15:21
Signatures
Xenorat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-29 15:21
Reported
2024-05-29 15:23
Platform
win10v2004-20240508-en
Max time kernel
80s
Max time network
82s
Command Line
Signatures
XenorRat
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "233" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 | C:\Windows\system32\LogonUI.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" | C:\Windows\system32\LogonUI.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" | C:\Windows\system32\LogonUI.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\XenoRat.exe\"" | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open\command | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open\command | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XenoRat.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\SysWOW64\shutdown.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\SysWOW64\shutdown.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\LogonUI.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\XenoRat.exe
"C:\Users\Admin\AppData\Local\Temp\XenoRat.exe"
C:\Windows\SYSTEM32\cmd.exe
cmd /c start "" "%windir%\system32\fodhelper.exe"
C:\Windows\system32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
C:\Users\Admin\AppData\Local\Temp\XenoRat.exe
"C:\Users\Admin\AppData\Local\Temp\XenoRat.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /query /v /fo csv
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\XenoRat.exe"
C:\Windows\SysWOW64\choice.exe
choice /C Y /N /D Y /T 3
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4699.tmp" /F
C:\Windows\SysWOW64\shutdown.exe
"C:\Windows\System32\shutdown.exe" /r /t 0
C:\Windows\system32\LogonUI.exe
"LogonUI.exe" /flags:0x4 /state0:0xa3978855 /state1:0x41c64e6d
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 202.131.50.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.181.190.20.in-addr.arpa | udp |
| NL | 23.62.61.129:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 129.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | taking-headquarters.gl.at.ply.gg | udp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 20.221.185.147.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 203.107.17.2.in-addr.arpa | udp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 147.185.221.20:3069 | taking-headquarters.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 28.73.42.20.in-addr.arpa | udp |
Files
memory/2308-0-0x000000007484E000-0x000000007484F000-memory.dmp
memory/2308-1-0x00000000005B0000-0x00000000005C2000-memory.dmp
memory/2308-2-0x0000000074840000-0x0000000074FF0000-memory.dmp
memory/2308-3-0x0000000005AE0000-0x0000000005B46000-memory.dmp
memory/2308-4-0x000000007484E000-0x000000007484F000-memory.dmp
memory/2308-5-0x0000000074840000-0x0000000074FF0000-memory.dmp
memory/2308-6-0x0000000005A70000-0x0000000005A7C000-memory.dmp
memory/2308-7-0x0000000074840000-0x0000000074FF0000-memory.dmp
memory/3912-8-0x0000000005760000-0x0000000005768000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp4699.tmp
| MD5 | fced461c66c41ce1133f7b1f0acc6472 |
| SHA1 | 7122010b3214e5688b490856da4f386635893c7d |
| SHA256 | 5173e9c4402ab0307b0fab6b7945c3f2585ed60653341206f3176f59730492ee |
| SHA512 | a0cd6dd3f0131d9945bb9df5fcf378d2bef3b67f82720a3401e62b5b62ff8487f627330f499ea5559a33302d1d57f8a5d177e7a479a169cd2cbd1ad33ac11ba9 |
memory/3912-11-0x0000000005B90000-0x0000000005B98000-memory.dmp