Malware Analysis Report

2024-08-06 18:18

Sample ID 240530-1wrpkacb48
Target monkey.exe
SHA256 bf0927a0af35c23071466397ab21b38951d5847a4c7dda419d83a1a98183b12f
Tags
xenorat rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bf0927a0af35c23071466397ab21b38951d5847a4c7dda419d83a1a98183b12f

Threat Level: Known bad

The file monkey.exe was found to be: Known bad.

Malicious Activity Summary

xenorat rat trojan

Xenorat family

XenorRat

Checks computer location settings

Executes dropped EXE

Enumerates physical storage devices

Unsigned PE

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-30 22:00

Signatures

Xenorat family

xenorat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-30 22:00

Reported

2024-05-30 22:01

Platform

win10v2004-20240508-en

Max time kernel

19s

Max time network

28s

Command Line

"C:\Users\Admin\AppData\Local\Temp\monkey.exe"

Signatures

XenorRat

trojan rat xenorat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\monkey.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\monkey.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\XenoManager\monkey.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\XenoManager\monkey.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\monkey.exe

"C:\Users\Admin\AppData\Local\Temp\monkey.exe"

C:\Users\Admin\AppData\Roaming\XenoManager\monkey.exe

"C:\Users\Admin\AppData\Roaming\XenoManager\monkey.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "Console" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4575.tmp" /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 105.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
BE 2.17.107.99:443 www.bing.com tcp
US 8.8.8.8:53 99.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 147.185.221.20:3403 tcp
US 8.8.8.8:53 20.221.185.147.in-addr.arpa udp
US 147.185.221.20:3403 tcp
US 147.185.221.20:3403 tcp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 147.185.221.20:3403 tcp

Files

memory/1576-0-0x000000007465E000-0x000000007465F000-memory.dmp

memory/1576-1-0x0000000000C40000-0x0000000000C52000-memory.dmp

C:\Users\Admin\AppData\Roaming\XenoManager\monkey.exe

MD5 5bf8a2aeedfb1123eb10af5e0f0e3302
SHA1 cdb9c4090f4ff8b9a5d94eaae30c15f4916e177a
SHA256 bf0927a0af35c23071466397ab21b38951d5847a4c7dda419d83a1a98183b12f
SHA512 3fa42409cea75c32b6323567fd7f03f10fd220fd73a93e4ba4d6bf998b228377e404d1a050f32e952b742c8d89a7e2384c14129608814711e285bfad33024983

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\monkey.exe.log

MD5 916851e072fbabc4796d8916c5131092
SHA1 d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA256 7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA512 07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

memory/964-16-0x0000000074650000-0x0000000074E00000-memory.dmp

memory/964-17-0x0000000074650000-0x0000000074E00000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp4575.tmp

MD5 d2d5370e04de5428f88776f88d42a4fa
SHA1 293a99701932f383f2d555ff754276682832593e
SHA256 6a95327ef1dc4901039edd42fd94baa4455a4aac6839edaf0df89e962ec26b7b
SHA512 dfa78ee247911031bd6ac5ae587288ac9342cb6077de50a16f3b18c4f73865dd972a2ef2940baffc9e037b8a84eb49f6ff3fc50f14f161d6bdac03f455215b8d

memory/964-19-0x0000000005660000-0x00000000056C6000-memory.dmp

memory/964-20-0x0000000004D40000-0x0000000004D4A000-memory.dmp

memory/964-21-0x0000000005FC0000-0x0000000006564000-memory.dmp