Malware Analysis Report

2024-08-06 18:19

Sample ID 240530-3xms4sga24
Target testingrat.exe
SHA256 afe1cd83d722daa13601c0de896cec93dbae4f9ce4ad78ca3b845060101f0101
Tags
xenorat rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

afe1cd83d722daa13601c0de896cec93dbae4f9ce4ad78ca3b845060101f0101

Threat Level: Known bad

The file testingrat.exe was found to be: Known bad.

Malicious Activity Summary

xenorat rat trojan

Xenorat family

XenorRat

Checks computer location settings

Executes dropped EXE

Enumerates physical storage devices

Unsigned PE

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-30 23:53

Signatures

Xenorat family

xenorat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-30 23:53

Reported

2024-05-30 23:55

Platform

win10v2004-20240426-en

Max time kernel

107s

Max time network

108s

Command Line

"C:\Users\Admin\AppData\Local\Temp\testingrat.exe"

Signatures

XenorRat

trojan rat xenorat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\testingrat.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\testingrat.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\testingrat.exe

"C:\Users\Admin\AppData\Local\Temp\testingrat.exe"

C:\Users\Admin\AppData\Roaming\XenoManager\testingrat.exe

"C:\Users\Admin\AppData\Roaming\XenoManager\testingrat.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "Console" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5544.tmp" /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 related-directed.gl.at.ply.gg udp
US 147.185.221.20:3403 related-directed.gl.at.ply.gg tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 147.185.221.20:3403 related-directed.gl.at.ply.gg tcp
US 8.8.8.8:53 163.126.19.2.in-addr.arpa udp
US 147.185.221.20:3403 related-directed.gl.at.ply.gg tcp
US 8.8.8.8:53 145.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 147.185.221.20:3403 related-directed.gl.at.ply.gg tcp
US 147.185.221.20:3403 related-directed.gl.at.ply.gg tcp
US 8.8.8.8:53 20.221.185.147.in-addr.arpa udp
US 147.185.221.20:3403 related-directed.gl.at.ply.gg tcp

Files

memory/1596-0-0x00000000750FE000-0x00000000750FF000-memory.dmp

memory/1596-1-0x00000000009C0000-0x00000000009D2000-memory.dmp

C:\Users\Admin\AppData\Roaming\XenoManager\testingrat.exe

MD5 7bf7d5fb2ed513c687cd676fe53f5ee9
SHA1 e9251ef1dd3ebe4f17acf0b3552e22751009c8c1
SHA256 afe1cd83d722daa13601c0de896cec93dbae4f9ce4ad78ca3b845060101f0101
SHA512 4c189aee06185359827432b021e8850b1bfbc78da932c4b259b665de7a1b293e0ee281627750bcce7e4fb2ccd8b2b8c0f89a7d68b77e27e7e52832a887f0f447

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\testingrat.exe.log

MD5 916851e072fbabc4796d8916c5131092
SHA1 d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA256 7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA512 07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

memory/2388-16-0x00000000750F0000-0x00000000758A0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp5544.tmp

MD5 eda61e8aea78084b221c5e803874884a
SHA1 030505a2e13c578d3b856df4e4293767ac1e4308
SHA256 d499b32d1e31c3b4c0079d1111a0f46f218aae50ad95b93ee89fd564dd75efc0
SHA512 410b6d505a3407540b51ae11c908aefa1556620c828541653695267fb61fc0a5dffaf22288041d98a3c18e1acca6774dd048ac1d508c327f5b6080bc27367e71

memory/2388-18-0x00000000750F0000-0x00000000758A0000-memory.dmp

memory/2388-19-0x0000000006300000-0x0000000006366000-memory.dmp