Analysis Overview
SHA256
477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c
Threat Level: Known bad
The file 477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c was found to be: Known bad.
Malicious Activity Summary
XenorRat
Reads user/profile data of web browsers
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Program crash
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Scheduled Task/Job: Scheduled Task
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-07-04 11:40
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-04 11:40
Reported
2024-07-04 11:42
Platform
win7-20240221-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
XenorRat
Executes dropped EXE
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe | N/A |
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
Enumerates physical storage devices
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
"C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe"
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "dms" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD78.tmp" /F
Network
| Country | Destination | Domain | Proto |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp |
Files
memory/3020-0-0x000000007429E000-0x000000007429F000-memory.dmp
memory/3020-1-0x0000000000E20000-0x0000000000E60000-memory.dmp
memory/3020-2-0x0000000000210000-0x0000000000216000-memory.dmp
memory/3020-4-0x0000000074290000-0x000000007497E000-memory.dmp
memory/3020-3-0x0000000000220000-0x000000000025E000-memory.dmp
memory/3020-5-0x0000000000270000-0x0000000000276000-memory.dmp
memory/3056-6-0x0000000000400000-0x0000000000412000-memory.dmp
memory/3056-12-0x0000000000400000-0x0000000000412000-memory.dmp
memory/3056-8-0x0000000000400000-0x0000000000412000-memory.dmp
memory/3004-24-0x0000000074290000-0x000000007497E000-memory.dmp
memory/3056-18-0x0000000074290000-0x000000007497E000-memory.dmp
\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
| MD5 | b41d067615ca60ffe4253297866d79be |
| SHA1 | 1aab2b69eb9f918d1e0a23a82a98411709ee2fdb |
| SHA256 | 477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c |
| SHA512 | 7c5b98c2e3fbdafc0949ca9d32b9c41be044f3b99052e1119472d1999442114ed60d5949929e7b14aa028c77c7adc638ee0507362ab848af7cb4612c9313e29e |
memory/2716-33-0x0000000000EE0000-0x0000000000F20000-memory.dmp
memory/3020-32-0x0000000074290000-0x000000007497E000-memory.dmp
memory/3056-31-0x0000000074290000-0x000000007497E000-memory.dmp
memory/3004-46-0x0000000074290000-0x000000007497E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpD78.tmp
| MD5 | 37d8f916f69666f7b5814df290e50c2f |
| SHA1 | d4acff3a48bb79e17a6174a012f5ab8c84c7cec2 |
| SHA256 | 90dc3324a60e56d6db1f21a9a04887365a999232b2a4a7c994f8e1c3ecf9603a |
| SHA512 | 2050d02a75e01c132074014bb718392e7022d7a4d73442127cc61273a9d8e3324f0025d535b0a2c249d7f377a299e77b61ea2f821f3e4571ae4ad252071e0b10 |
memory/3004-49-0x0000000074290000-0x000000007497E000-memory.dmp
memory/3004-50-0x00000000060D0000-0x00000000061CA000-memory.dmp
memory/3004-66-0x0000000074290000-0x000000007497E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-04 11:40
Reported
2024-07-04 11:42
Platform
win10v2004-20240611-en
Max time kernel
149s
Max time network
153s
Command Line
Signatures
XenorRat
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe | N/A |
Executes dropped EXE
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
"C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe"
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Local\Temp\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1792 -ip 1792
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 80
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3868 -ip 3868
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 80
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "dms" /XML "C:\Users\Admin\AppData\Local\Temp\tmp299B.tmp" /F
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.181.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 192.142.123.92.in-addr.arpa | udp |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| US | 8.8.8.8:53 | 167.248.92.91.in-addr.arpa | udp |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| NL | 91.92.248.167:1280 | tcp |
Files
memory/2284-0-0x000000007500E000-0x000000007500F000-memory.dmp
memory/2284-1-0x0000000000780000-0x00000000007C0000-memory.dmp
memory/2284-2-0x00000000029B0000-0x00000000029B6000-memory.dmp
memory/2284-3-0x0000000004FC0000-0x0000000004FFE000-memory.dmp
memory/2284-4-0x0000000075000000-0x00000000757B0000-memory.dmp
memory/2284-5-0x0000000005320000-0x00000000053BC000-memory.dmp
memory/2284-6-0x0000000004B70000-0x0000000004B76000-memory.dmp
memory/1668-7-0x0000000000400000-0x0000000000412000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe.log
| MD5 | 8334a471a4b492ece225b471b8ad2fc8 |
| SHA1 | 1cb24640f32d23e8f7800bd0511b7b9c3011d992 |
| SHA256 | 5612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169 |
| SHA512 | 56ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36 |
memory/1668-13-0x0000000075000000-0x00000000757B0000-memory.dmp
memory/2284-14-0x0000000075000000-0x00000000757B0000-memory.dmp
memory/2528-15-0x0000000075000000-0x00000000757B0000-memory.dmp
C:\Users\Admin\AppData\Roaming\XenoManager\477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c.exe
| MD5 | b41d067615ca60ffe4253297866d79be |
| SHA1 | 1aab2b69eb9f918d1e0a23a82a98411709ee2fdb |
| SHA256 | 477ca1add0f03886c3bb29c4f03ffd2aa4d5c2a0fb3346fe46890c25347a8d7c |
| SHA512 | 7c5b98c2e3fbdafc0949ca9d32b9c41be044f3b99052e1119472d1999442114ed60d5949929e7b14aa028c77c7adc638ee0507362ab848af7cb4612c9313e29e |
memory/2528-27-0x0000000075000000-0x00000000757B0000-memory.dmp
memory/1764-28-0x0000000075000000-0x00000000757B0000-memory.dmp
memory/1668-26-0x0000000075000000-0x00000000757B0000-memory.dmp
memory/1764-35-0x0000000075000000-0x00000000757B0000-memory.dmp
memory/1668-36-0x0000000075000000-0x00000000757B0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp299B.tmp
| MD5 | 37d8f916f69666f7b5814df290e50c2f |
| SHA1 | d4acff3a48bb79e17a6174a012f5ab8c84c7cec2 |
| SHA256 | 90dc3324a60e56d6db1f21a9a04887365a999232b2a4a7c994f8e1c3ecf9603a |
| SHA512 | 2050d02a75e01c132074014bb718392e7022d7a4d73442127cc61273a9d8e3324f0025d535b0a2c249d7f377a299e77b61ea2f821f3e4571ae4ad252071e0b10 |
memory/1668-39-0x0000000005AB0000-0x0000000005B16000-memory.dmp
memory/1668-40-0x0000000005D20000-0x0000000005E1A000-memory.dmp
memory/1668-41-0x0000000005FF0000-0x00000000061B2000-memory.dmp
memory/1668-42-0x0000000005EA0000-0x0000000005F16000-memory.dmp
memory/1668-43-0x0000000005F20000-0x0000000005F70000-memory.dmp
memory/1668-44-0x00000000066F0000-0x0000000006C1C000-memory.dmp
memory/1668-45-0x0000000006300000-0x000000000631E000-memory.dmp
memory/1668-54-0x0000000006C20000-0x0000000006EA0000-memory.dmp