Malware Analysis Report

2024-08-06 18:19

Sample ID 240530-nn244sgf94
Target 66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223
SHA256 66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223
Tags
xenorat rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223

Threat Level: Known bad

The file 66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223 was found to be: Known bad.

Malicious Activity Summary

xenorat rat trojan

XenorRat

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Enumerates physical storage devices

Unsigned PE

Creates scheduled task(s)

Delays execution with timeout.exe

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-30 11:33

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-30 11:33

Reported

2024-05-30 11:36

Platform

win7-20240508-en

Max time kernel

140s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe"

Signatures

XenorRat

trojan rat xenorat

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2104 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe
PID 2104 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe
PID 2104 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe
PID 2396 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 2396 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 2396 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 2732 wrote to memory of 2736 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\certutil.exe
PID 2732 wrote to memory of 2736 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\certutil.exe
PID 2732 wrote to memory of 2736 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\certutil.exe
PID 2732 wrote to memory of 2764 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 2732 wrote to memory of 2764 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 2732 wrote to memory of 2764 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 2732 wrote to memory of 2760 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 2732 wrote to memory of 2760 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 2732 wrote to memory of 2760 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 2396 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 2396 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 2396 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 2644 wrote to memory of 2404 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2644 wrote to memory of 2404 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2644 wrote to memory of 2404 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2396 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\WerFault.exe
PID 2396 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\WerFault.exe
PID 2396 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\WerFault.exe
PID 2404 wrote to memory of 2776 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 2404 wrote to memory of 2776 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 2404 wrote to memory of 2776 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 2104 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe
PID 2104 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe
PID 2104 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe
PID 2104 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe
PID 2940 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe
PID 2940 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe
PID 2940 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe
PID 2940 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe
PID 2592 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe

"C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe" MD5 | find /i /v "md5" | find /i /v "certutil"

C:\Windows\system32\certutil.exe

certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe" MD5

C:\Windows\system32\find.exe

find /i /v "md5"

C:\Windows\system32\find.exe

find /i /v "certutil"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"

C:\Windows\system32\cmd.exe

cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2396 -s 296

C:\Windows\system32\timeout.exe

timeout /t 5

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"

C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe

"C:\Users\Admin\AppData\Roaming\XenoManager\Runtime Broker.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "Windows Security" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5C91.tmp" /F

Network

Country Destination Domain Proto
N/A 127.0.0.1:49202 tcp
N/A 127.0.0.1:49204 tcp
US 8.8.8.8:53 licenseauth.host udp
GB 109.70.148.32:443 licenseauth.host tcp
US 23.243.100.240:4444 tcp
US 23.243.100.240:4444 tcp
US 23.243.100.240:4444 tcp
US 23.243.100.240:4444 tcp
US 23.243.100.240:4444 tcp

Files

\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe

MD5 2582a8dfdf77e54747a2e84a27377131
SHA1 87a91b5cd34f2ed215a0092997ce2989a333b920
SHA256 38ea6534608e1496b285dadaa545a968c2b128111fc3841ba84f162f1a3f8e20
SHA512 f6193e490b95ef0ac3e2c66c2e83d8f582d4d86c4360b117a7ed11079a612ef62c2408968b96d3a55453cc0ac01b48773377ca090855650c368210235883ba3c

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe

MD5 888405f1ed21b89ac08343458251bf26
SHA1 4c9b54da2336376441af26ed4bedcd6fda1b316f
SHA256 a8b6f84c5a83b221cb27203a565852745db0010e793aedfe2e98db4cd7f10859
SHA512 4280eddeaba17692a542ab11e1ad92cde5aedd0857990bea01dbd967334801318fd5c31519e58af021ff07c7cf37c2cea6c99502d7f7c1b26852cfb935e3a2a1

memory/2940-21-0x0000000000030000-0x0000000000042000-memory.dmp

memory/2592-29-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp5C91.tmp

MD5 5b219b4101d84f08808354aca4b544bc
SHA1 f067faceacdefb5d1062fac1400c288aca4b36d7
SHA256 7072f7d22c1809a4f13ab22b1b2eacebf3f7333f668810e4bad2e3c22d2b9836
SHA512 67be44450193b5a10529b668e5dc3a35647bf85bb6cadbb2e9a45271d808f24ef0e8dc55103a50b1a82edc71f3c3371de50ac81220366a8188cca21a6587c8cd

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-30 11:33

Reported

2024-05-30 11:36

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

139s

Command Line

"C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4552 wrote to memory of 4920 N/A C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe
PID 4552 wrote to memory of 4920 N/A C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe
PID 4920 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 4920 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 2276 wrote to memory of 2004 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\certutil.exe
PID 2276 wrote to memory of 2004 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\certutil.exe
PID 2276 wrote to memory of 4072 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 2276 wrote to memory of 4072 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 2276 wrote to memory of 4080 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 2276 wrote to memory of 4080 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 4920 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 4920 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 4920 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe
PID 4920 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe C:\Windows\system32\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe

"C:\Users\Admin\AppData\Local\Temp\66f635bf805463c4a83b969ac8d4cc563b2feadaea0460dc22c5f53be72a9223.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe" MD5 | find /i /v "md5" | find /i /v "certutil"

C:\Windows\system32\certutil.exe

certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe" MD5

C:\Windows\system32\find.exe

find /i /v "md5"

C:\Windows\system32\find.exe

find /i /v "certutil"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c cls

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c cls

Network

Country Destination Domain Proto
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 0.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
BE 88.221.83.218:443 www.bing.com tcp
US 8.8.8.8:53 licenseauth.host udp
GB 109.70.148.32:443 licenseauth.host tcp
US 8.8.8.8:53 218.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
N/A 127.0.0.1:51691 tcp
N/A 127.0.0.1:51693 tcp
US 8.8.8.8:53 32.148.70.109.in-addr.arpa udp
US 8.8.8.8:53 11.97.55.23.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 52.111.227.11:443 tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\RarSFX0\InternalLoader2.exe

MD5 2582a8dfdf77e54747a2e84a27377131
SHA1 87a91b5cd34f2ed215a0092997ce2989a333b920
SHA256 38ea6534608e1496b285dadaa545a968c2b128111fc3841ba84f162f1a3f8e20
SHA512 f6193e490b95ef0ac3e2c66c2e83d8f582d4d86c4360b117a7ed11079a612ef62c2408968b96d3a55453cc0ac01b48773377ca090855650c368210235883ba3c