Malware Analysis Report

2024-08-06 18:20

Sample ID 240601-cf2b3aea4z
Target ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
SHA256 ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c
Tags
xenorat rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c

Threat Level: Known bad

The file ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe was found to be: Known bad.

Malicious Activity Summary

xenorat rat trojan

XenorRat

Detects executables packed with ConfuserEx Mod

Detects executables packed with ConfuserEx Mod

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Program crash

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-01 02:01

Signatures

Detects executables packed with ConfuserEx Mod

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-01 02:01

Reported

2024-06-01 02:04

Platform

win7-20240215-en

Max time kernel

141s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe"

Signatures

XenorRat

trojan rat xenorat

Detects executables packed with ConfuserEx Mod

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2316 set thread context of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 set thread context of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 set thread context of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 set thread context of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 set thread context of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 set thread context of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2316 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2316 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2580 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2580 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2580 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2580 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2284 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2520 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Windows\SysWOW64\schtasks.exe
PID 2520 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Windows\SysWOW64\schtasks.exe
PID 2520 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Windows\SysWOW64\schtasks.exe
PID 2520 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

"C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe"

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

"C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe"

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "hns" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF3D.tmp" /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 dns.dobiamfollollc.online udp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp

Files

memory/2316-0-0x000000007494E000-0x000000007494F000-memory.dmp

memory/2316-1-0x0000000001330000-0x0000000001376000-memory.dmp

memory/2316-2-0x0000000000200000-0x0000000000206000-memory.dmp

memory/2316-4-0x00000000003E0000-0x0000000000420000-memory.dmp

memory/2316-3-0x0000000074940000-0x000000007502E000-memory.dmp

memory/2316-5-0x0000000000330000-0x0000000000336000-memory.dmp

memory/2520-8-0x0000000000400000-0x0000000000412000-memory.dmp

memory/2520-6-0x0000000000400000-0x0000000000412000-memory.dmp

memory/2520-12-0x0000000000400000-0x0000000000412000-memory.dmp

memory/2520-23-0x0000000074940000-0x000000007502E000-memory.dmp

memory/2580-24-0x0000000074940000-0x000000007502E000-memory.dmp

memory/2316-25-0x0000000074940000-0x000000007502E000-memory.dmp

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

MD5 5910e4d900fcda28e32e7f7bf7d24487
SHA1 60f61f3719fe959563de46b53c2547a39235a090
SHA256 ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c
SHA512 fb71156f713496b96b6e939048c581012d863cad54e5f9404d2d7717962c3d53ff185fb4e2d303bb9b3dcda3e5926e2955fe7f7f36fd3d5afb305449c20b41e1

memory/2284-32-0x0000000001050000-0x0000000001096000-memory.dmp

memory/2580-33-0x0000000074940000-0x000000007502E000-memory.dmp

memory/2520-49-0x0000000074940000-0x000000007502E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpF3D.tmp

MD5 acc2e63b20dcfcbb6e4bfa5e50a54231
SHA1 ea0f11f1eca19a6457dfd69aa2b59c444427df86
SHA256 a2e50259b0d62d8a42b7772548c71556d42bed34bf7cbf0983d4ab85cd9a4eca
SHA512 b22a08e30667be57249f5b1a114cb791c92762ac794107b6df2f92b244d6e79e043bc39fe872c54e101f860e0ccaf3c1b1efe4e1a3ff467bd47a4619716abd18

memory/2520-52-0x0000000074940000-0x000000007502E000-memory.dmp

memory/2520-53-0x0000000074940000-0x000000007502E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-01 02:01

Reported

2024-06-01 02:04

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe"

Signatures

XenorRat

trojan rat xenorat

Detects executables packed with ConfuserEx Mod

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1480 set thread context of 2952 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 set thread context of 436 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 set thread context of 3544 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 set thread context of 3172 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 set thread context of 1856 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 set thread context of 2568 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1480 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 436 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 436 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 436 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 436 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 436 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 436 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 436 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 436 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 1480 wrote to memory of 3544 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 436 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 436 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 436 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 1856 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 2836 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
PID 3544 wrote to memory of 4540 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Windows\SysWOW64\schtasks.exe
PID 3544 wrote to memory of 4540 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Windows\SysWOW64\schtasks.exe
PID 3544 wrote to memory of 4540 N/A C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

"C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe"

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Local\Temp\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

"C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe"

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3172 -ip 3172

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1856 -ip 1856

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 80

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 80

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "hns" /XML "C:\Users\Admin\AppData\Local\Temp\tmp43DA.tmp" /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 dns.dobiamfollollc.online udp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
NL 94.156.66.169:1284 dns.dobiamfollollc.online tcp
US 8.8.8.8:53 23.173.189.20.in-addr.arpa udp

Files

memory/1480-0-0x0000000074C9E000-0x0000000074C9F000-memory.dmp

memory/1480-1-0x00000000002A0000-0x00000000002E6000-memory.dmp

memory/1480-2-0x00000000026E0000-0x00000000026E6000-memory.dmp

memory/1480-3-0x0000000074C90000-0x0000000075440000-memory.dmp

memory/1480-4-0x0000000004E90000-0x0000000004ED0000-memory.dmp

memory/1480-5-0x0000000004F70000-0x000000000500C000-memory.dmp

memory/1480-6-0x00000000055C0000-0x0000000005B64000-memory.dmp

memory/1480-7-0x00000000050B0000-0x0000000005142000-memory.dmp

memory/1480-8-0x0000000004C70000-0x0000000004C76000-memory.dmp

memory/2952-9-0x0000000000400000-0x0000000000412000-memory.dmp

memory/2952-16-0x0000000074C90000-0x0000000075440000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe.log

MD5 916851e072fbabc4796d8916c5131092
SHA1 d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA256 7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA512 07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

memory/436-17-0x0000000074C90000-0x0000000075440000-memory.dmp

memory/1480-18-0x0000000074C90000-0x0000000075440000-memory.dmp

C:\Users\Admin\AppData\Roaming\XenoManager\ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe

MD5 5910e4d900fcda28e32e7f7bf7d24487
SHA1 60f61f3719fe959563de46b53c2547a39235a090
SHA256 ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c
SHA512 fb71156f713496b96b6e939048c581012d863cad54e5f9404d2d7717962c3d53ff185fb4e2d303bb9b3dcda3e5926e2955fe7f7f36fd3d5afb305449c20b41e1

memory/3544-26-0x0000000074C90000-0x0000000075440000-memory.dmp

memory/436-31-0x0000000074C90000-0x0000000075440000-memory.dmp

memory/3172-32-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2952-38-0x0000000074C90000-0x0000000075440000-memory.dmp

memory/3544-39-0x0000000074C90000-0x0000000075440000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp43DA.tmp

MD5 acc2e63b20dcfcbb6e4bfa5e50a54231
SHA1 ea0f11f1eca19a6457dfd69aa2b59c444427df86
SHA256 a2e50259b0d62d8a42b7772548c71556d42bed34bf7cbf0983d4ab85cd9a4eca
SHA512 b22a08e30667be57249f5b1a114cb791c92762ac794107b6df2f92b244d6e79e043bc39fe872c54e101f860e0ccaf3c1b1efe4e1a3ff467bd47a4619716abd18