Analysis Overview
SHA256
477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c
Threat Level: Known bad
The file odeme tarihleri.scr.exe was found to be: Known bad.
Malicious Activity Summary
XenorRat
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Checks computer location settings
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-07-04 11:37
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-04 11:37
Reported
2024-07-04 11:39
Platform
win7-20231129-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
XenorRat
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe | N/A |
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
Enumerates physical storage devices
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "dms" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFA08.tmp" /F
Network
| Country | Destination | Domain | Proto |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp |
Files
memory/1276-0-0x00000000743DE000-0x00000000743DF000-memory.dmp
memory/1276-1-0x0000000000A00000-0x0000000000A40000-memory.dmp
memory/1276-2-0x00000000004B0000-0x00000000004B6000-memory.dmp
memory/1276-4-0x00000000743D0000-0x0000000074ABE000-memory.dmp
memory/1276-3-0x00000000005D0000-0x000000000060E000-memory.dmp
memory/1276-5-0x00000000004E0000-0x00000000004E6000-memory.dmp
memory/1940-6-0x0000000000400000-0x0000000000412000-memory.dmp
memory/1940-16-0x0000000000400000-0x0000000000412000-memory.dmp
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
| MD5 | b41d067615ca60ffe4253297866d79be |
| SHA1 | 1aab2b69eb9f918d1e0a23a82a98411709ee2fdb |
| SHA256 | 477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c |
| SHA512 | 7c5b98c2e3fbdafc0949ca9d32b9c41be044f3b99052e1119472d1999442114ed60d5949929e7b14aa028c77c7adc638ee0507362ab848af7cb4612c9313e29e |
memory/1940-23-0x00000000743D0000-0x0000000074ABE000-memory.dmp
memory/1276-28-0x00000000743D0000-0x0000000074ABE000-memory.dmp
memory/3048-13-0x0000000000400000-0x0000000000412000-memory.dmp
memory/3048-32-0x00000000743D0000-0x0000000074ABE000-memory.dmp
memory/1940-31-0x00000000743D0000-0x0000000074ABE000-memory.dmp
memory/3000-33-0x0000000000DD0000-0x0000000000E10000-memory.dmp
memory/3048-46-0x00000000743D0000-0x0000000074ABE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpFA08.tmp
| MD5 | 37ec5267dd86eda7ede5ebd12f1e36f1 |
| SHA1 | 44b076789f3b146b984bf38a80ede8a02af969c7 |
| SHA256 | 438b9d04247ca8bea31f6021570568582eb427bc258ad053a09c5c9dadfbfb22 |
| SHA512 | 23c79488911085bf39d31aa3e3be93681e7cc147e8853b88ab1fcee7b334895d575c2afe0d119993879aafdc020385aa7c96991567dd82498eef40061b1359ad |
memory/3048-49-0x00000000743D0000-0x0000000074ABE000-memory.dmp
memory/3048-50-0x00000000743D0000-0x0000000074ABE000-memory.dmp
memory/3048-51-0x00000000062A0000-0x000000000639A000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-04 11:37
Reported
2024-07-04 11:39
Platform
win10v2004-20240611-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
XenorRat
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
Enumerates physical storage devices
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Local\Temp\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "dms" /XML "C:\Users\Admin\AppData\Local\Temp\tmp72CA.tmp" /F
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 147.142.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| US | 8.8.8.8:53 | 167.248.92.91.in-addr.arpa | udp |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
Files
memory/5092-0-0x00000000745BE000-0x00000000745BF000-memory.dmp
memory/5092-1-0x00000000004F0000-0x0000000000530000-memory.dmp
memory/5092-2-0x0000000000E20000-0x0000000000E26000-memory.dmp
memory/5092-3-0x00000000745B0000-0x0000000074D60000-memory.dmp
memory/5092-4-0x000000000DA00000-0x000000000DA3E000-memory.dmp
memory/5092-5-0x000000000DAE0000-0x000000000DB7C000-memory.dmp
memory/5092-6-0x0000000004950000-0x0000000004956000-memory.dmp
memory/4044-7-0x0000000000400000-0x0000000000412000-memory.dmp
memory/4044-10-0x00000000745B0000-0x0000000074D60000-memory.dmp
memory/1464-13-0x00000000745B0000-0x0000000074D60000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\odeme tarihleri.scr.exe.log
| MD5 | 8334a471a4b492ece225b471b8ad2fc8 |
| SHA1 | 1cb24640f32d23e8f7800bd0511b7b9c3011d992 |
| SHA256 | 5612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169 |
| SHA512 | 56ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36 |
memory/2016-16-0x00000000745B0000-0x0000000074D60000-memory.dmp
memory/5092-15-0x00000000745B0000-0x0000000074D60000-memory.dmp
memory/1464-17-0x00000000745B0000-0x0000000074D60000-memory.dmp
C:\Users\Admin\AppData\Roaming\XenoManager\odeme tarihleri.scr.exe
| MD5 | b41d067615ca60ffe4253297866d79be |
| SHA1 | 1aab2b69eb9f918d1e0a23a82a98411709ee2fdb |
| SHA256 | 477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c |
| SHA512 | 7c5b98c2e3fbdafc0949ca9d32b9c41be044f3b99052e1119472d1999442114ed60d5949929e7b14aa028c77c7adc638ee0507362ab848af7cb4612c9313e29e |
memory/4044-28-0x00000000745B0000-0x0000000074D60000-memory.dmp
memory/1464-35-0x00000000745B0000-0x0000000074D60000-memory.dmp
memory/2016-36-0x00000000745B0000-0x0000000074D60000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp72CA.tmp
| MD5 | 37ec5267dd86eda7ede5ebd12f1e36f1 |
| SHA1 | 44b076789f3b146b984bf38a80ede8a02af969c7 |
| SHA256 | 438b9d04247ca8bea31f6021570568582eb427bc258ad053a09c5c9dadfbfb22 |
| SHA512 | 23c79488911085bf39d31aa3e3be93681e7cc147e8853b88ab1fcee7b334895d575c2afe0d119993879aafdc020385aa7c96991567dd82498eef40061b1359ad |
memory/1464-39-0x0000000005D60000-0x0000000005DC6000-memory.dmp
memory/1464-40-0x0000000006110000-0x000000000620A000-memory.dmp
memory/1464-42-0x0000000006290000-0x0000000006306000-memory.dmp
memory/1464-41-0x00000000063E0000-0x00000000065A2000-memory.dmp
memory/1464-43-0x0000000006310000-0x0000000006360000-memory.dmp
memory/1464-44-0x0000000006AE0000-0x000000000700C000-memory.dmp
memory/1464-45-0x0000000006700000-0x000000000671E000-memory.dmp
memory/1464-54-0x0000000006860000-0x0000000006AE0000-memory.dmp