Malware Analysis Report

2024-08-06 18:21

Sample ID 240529-srnhcaad3y
Target XenoRat.exe
SHA256 f028a4628d7d5156c4f841ebaf32ac8ee1287c18bb44c3517b402e871faa1eb0
Tags
xenorat rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f028a4628d7d5156c4f841ebaf32ac8ee1287c18bb44c3517b402e871faa1eb0

Threat Level: Known bad

The file XenoRat.exe was found to be: Known bad.

Malicious Activity Summary

xenorat rat trojan

XenorRat

Xenorat family

Checks computer location settings

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Creates scheduled task(s)

Modifies data under HKEY_USERS

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-29 15:21

Signatures

Xenorat family

xenorat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-29 15:21

Reported

2024-05-29 15:23

Platform

win10v2004-20240508-en

Max time kernel

80s

Max time network

82s

Command Line

"C:\Users\Admin\AppData\Local\Temp\XenoRat.exe"

Signatures

XenorRat

trojan rat xenorat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "233" C:\Windows\system32\LogonUI.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 C:\Windows\system32\LogonUI.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" C:\Windows\system32\LogonUI.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" C:\Windows\system32\LogonUI.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\XenoRat.exe\"" C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open\command C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\Shell\Open\command C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\shutdown.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\shutdown.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\LogonUI.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2308 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SYSTEM32\cmd.exe
PID 2308 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SYSTEM32\cmd.exe
PID 892 wrote to memory of 4584 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\fodhelper.exe
PID 892 wrote to memory of 4584 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\fodhelper.exe
PID 4584 wrote to memory of 3912 N/A C:\Windows\system32\fodhelper.exe C:\Users\Admin\AppData\Local\Temp\XenoRat.exe
PID 4584 wrote to memory of 3912 N/A C:\Windows\system32\fodhelper.exe C:\Users\Admin\AppData\Local\Temp\XenoRat.exe
PID 4584 wrote to memory of 3912 N/A C:\Windows\system32\fodhelper.exe C:\Users\Admin\AppData\Local\Temp\XenoRat.exe
PID 2308 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\schtasks.exe
PID 2308 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\schtasks.exe
PID 2308 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\schtasks.exe
PID 2308 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\cmd.exe
PID 2308 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\cmd.exe
PID 2308 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\cmd.exe
PID 3848 wrote to memory of 836 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 3848 wrote to memory of 836 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 3848 wrote to memory of 836 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 3912 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\schtasks.exe
PID 3912 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\schtasks.exe
PID 3912 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\schtasks.exe
PID 3912 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\shutdown.exe
PID 3912 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\shutdown.exe
PID 3912 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\XenoRat.exe C:\Windows\SysWOW64\shutdown.exe

Processes

C:\Users\Admin\AppData\Local\Temp\XenoRat.exe

"C:\Users\Admin\AppData\Local\Temp\XenoRat.exe"

C:\Windows\SYSTEM32\cmd.exe

cmd /c start "" "%windir%\system32\fodhelper.exe"

C:\Windows\system32\fodhelper.exe

"C:\Windows\system32\fodhelper.exe"

C:\Users\Admin\AppData\Local\Temp\XenoRat.exe

"C:\Users\Admin\AppData\Local\Temp\XenoRat.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /query /v /fo csv

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\XenoRat.exe"

C:\Windows\SysWOW64\choice.exe

choice /C Y /N /D Y /T 3

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4699.tmp" /F

C:\Windows\SysWOW64\shutdown.exe

"C:\Windows\System32\shutdown.exe" /r /t 0

C:\Windows\system32\LogonUI.exe

"LogonUI.exe" /flags:0x4 /state0:0xa3978855 /state1:0x41c64e6d

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 202.131.50.23.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 0.181.190.20.in-addr.arpa udp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 129.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 taking-headquarters.gl.at.ply.gg udp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 8.8.8.8:53 20.221.185.147.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 147.185.221.20:3069 taking-headquarters.gl.at.ply.gg tcp
US 8.8.8.8:53 28.73.42.20.in-addr.arpa udp

Files

memory/2308-0-0x000000007484E000-0x000000007484F000-memory.dmp

memory/2308-1-0x00000000005B0000-0x00000000005C2000-memory.dmp

memory/2308-2-0x0000000074840000-0x0000000074FF0000-memory.dmp

memory/2308-3-0x0000000005AE0000-0x0000000005B46000-memory.dmp

memory/2308-4-0x000000007484E000-0x000000007484F000-memory.dmp

memory/2308-5-0x0000000074840000-0x0000000074FF0000-memory.dmp

memory/2308-6-0x0000000005A70000-0x0000000005A7C000-memory.dmp

memory/2308-7-0x0000000074840000-0x0000000074FF0000-memory.dmp

memory/3912-8-0x0000000005760000-0x0000000005768000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp4699.tmp

MD5 fced461c66c41ce1133f7b1f0acc6472
SHA1 7122010b3214e5688b490856da4f386635893c7d
SHA256 5173e9c4402ab0307b0fab6b7945c3f2585ed60653341206f3176f59730492ee
SHA512 a0cd6dd3f0131d9945bb9df5fcf378d2bef3b67f82720a3401e62b5b62ff8487f627330f499ea5559a33302d1d57f8a5d177e7a479a169cd2cbd1ad33ac11ba9

memory/3912-11-0x0000000005B90000-0x0000000005B98000-memory.dmp