Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
2c6977ae3de5f4439b178da21bd279e3181dfc394eaad65ed1b006dfb3b25d5b.xll
Resource
win7-20240611-en
General
-
Target
2c6977ae3de5f4439b178da21bd279e3181dfc394eaad65ed1b006dfb3b25d5b.xll
-
Size
832KB
-
MD5
8d31657e3cc733753f129c0a8ab9dd35
-
SHA1
c5d9d5ddba7c1d9ee76c6ee21a5f6dcad1dbe82e
-
SHA256
2c6977ae3de5f4439b178da21bd279e3181dfc394eaad65ed1b006dfb3b25d5b
-
SHA512
381adba099f21f6b0ffa1ca70709ea5d3c3d4e7f87dc205b14e947c0c2353988d20c9fcf7732ac46a4e06fe4cfd6aa975c08e8357e2454ef2863fdac63015e34
-
SSDEEP
12288:jG1N4HkcgMsiOd58bzbBSreWQ0uqZzD1reWabd/aEce45oJNb1qX90YdquL:joOOMX1m+QHT+dCEcelJJ1qtHPL
Malware Config
Extracted
Extracted
xenorat
salutoepiesircam.sytes.net
Xeno_rat_nd8911d
-
delay
5000
-
install_path
appdata
-
port
4450
-
startup_name
setting
Signatures
-
Detects executables packed with ConfuserEx Mod 4 IoCs
resource yara_rule behavioral2/memory/1596-40-0x000001C3A7820000-0x000001C3A7866000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral2/files/0x0007000000023276-48.dat INDICATOR_EXE_Packed_ConfuserEx behavioral2/memory/624-59-0x0000000000F30000-0x0000000000F74000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral2/memory/624-64-0x0000000005B90000-0x0000000005BCE000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe -
Executes dropped EXE 6 IoCs
pid Process 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 4828 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 3520 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 2132 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 1008 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe -
Loads dropped DLL 2 IoCs
pid Process 1596 EXCEL.EXE 1596 EXCEL.EXE -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 624 set thread context of 4828 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 97 PID 624 set thread context of 3520 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 98 PID 1096 set thread context of 2132 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 103 PID 1096 set thread context of 1008 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4948 2132 WerFault.exe 103 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3532 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1596 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1596 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1596 EXCEL.EXE Token: SeDebugPrivilege 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe Token: SeDebugPrivilege 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1596 EXCEL.EXE 1596 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1596 wrote to memory of 624 1596 EXCEL.EXE 94 PID 1596 wrote to memory of 624 1596 EXCEL.EXE 94 PID 1596 wrote to memory of 624 1596 EXCEL.EXE 94 PID 624 wrote to memory of 4828 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 97 PID 624 wrote to memory of 4828 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 97 PID 624 wrote to memory of 4828 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 97 PID 624 wrote to memory of 4828 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 97 PID 624 wrote to memory of 4828 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 97 PID 624 wrote to memory of 4828 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 97 PID 624 wrote to memory of 4828 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 97 PID 624 wrote to memory of 4828 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 97 PID 624 wrote to memory of 3520 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 98 PID 624 wrote to memory of 3520 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 98 PID 624 wrote to memory of 3520 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 98 PID 624 wrote to memory of 3520 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 98 PID 624 wrote to memory of 3520 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 98 PID 624 wrote to memory of 3520 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 98 PID 624 wrote to memory of 3520 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 98 PID 624 wrote to memory of 3520 624 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 98 PID 4828 wrote to memory of 1096 4828 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 102 PID 4828 wrote to memory of 1096 4828 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 102 PID 4828 wrote to memory of 1096 4828 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 102 PID 1096 wrote to memory of 2132 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 103 PID 1096 wrote to memory of 2132 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 103 PID 1096 wrote to memory of 2132 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 103 PID 1096 wrote to memory of 2132 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 103 PID 1096 wrote to memory of 2132 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 103 PID 1096 wrote to memory of 2132 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 103 PID 1096 wrote to memory of 2132 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 103 PID 1096 wrote to memory of 2132 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 103 PID 1096 wrote to memory of 1008 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 104 PID 1096 wrote to memory of 1008 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 104 PID 1096 wrote to memory of 1008 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 104 PID 1096 wrote to memory of 1008 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 104 PID 1096 wrote to memory of 1008 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 104 PID 1096 wrote to memory of 1008 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 104 PID 1096 wrote to memory of 1008 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 104 PID 1096 wrote to memory of 1008 1096 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 104 PID 3520 wrote to memory of 3532 3520 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 109 PID 3520 wrote to memory of 3532 3520 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 109 PID 3520 wrote to memory of 3532 3520 46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe 109
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2c6977ae3de5f4439b178da21bd279e3181dfc394eaad65ed1b006dfb3b25d5b.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe"C:\Users\Admin\AppData\Local\Temp\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exeC:\Users\Admin\AppData\Local\Temp\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Roaming\XenoManager\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe"C:\Users\Admin\AppData\Roaming\XenoManager\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Roaming\XenoManager\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exeC:\Users\Admin\AppData\Roaming\XenoManager\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe5⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 806⤵
- Program crash
PID:4948
-
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exeC:\Users\Admin\AppData\Roaming\XenoManager\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe5⤵
- Executes dropped EXE
PID:1008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exeC:\Users\Admin\AppData\Local\Temp\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "setting" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7143.tmp" /F4⤵
- Creates scheduled task(s)
PID:3532
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2132 -ip 21321⤵PID:4400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3352 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\46d3a0fc-a22d-4718-a64f-6bf550b87b0e.exe.log
Filesize706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
C:\Users\Admin\AppData\Local\Temp\2c6977ae3de5f4439b178da21bd279e3181dfc394eaad65ed1b006dfb3b25d5b.xll
Filesize832KB
MD58d31657e3cc733753f129c0a8ab9dd35
SHA1c5d9d5ddba7c1d9ee76c6ee21a5f6dcad1dbe82e
SHA2562c6977ae3de5f4439b178da21bd279e3181dfc394eaad65ed1b006dfb3b25d5b
SHA512381adba099f21f6b0ffa1ca70709ea5d3c3d4e7f87dc205b14e947c0c2353988d20c9fcf7732ac46a4e06fe4cfd6aa975c08e8357e2454ef2863fdac63015e34
-
Filesize
237KB
MD575d3859dfcf940cc1da679fc66e9b7e1
SHA1343e5170eadfc2a3706bab50b422fa4d8103286f
SHA256d5c9c960a1bc89923c8ec30aebd6fb9389e1cc8937540c2284d5344a967465f6
SHA5121f825f829f055bf2f63243353a83834e0109b7f696a067ca9530bcf83db4697ecc6e353c4602a371a0bc7a514e42bd3720c128ac797444bf1eac6d859c842d49
-
Filesize
1KB
MD5a873253bd0d9da813b10d56be5fce07f
SHA1e1e52e6e2fc86b19a18fcc7322ad633ad4e9d434
SHA256f13efd66db3c46de582a4c2c09373679bcc87c06e644afa8bd708515d0ed8239
SHA5122000d551798fad98625b562734d2a7354a246537cd3aee4ea9c60a124b92c4faf00661b5eba2eb3a1c31d610e088e33dc499f9529200ef956fbc5c463828c948