Analysis Overview
SHA256
249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99
Threat Level: Known bad
The file fechas de pago.scr.exe was found to be: Known bad.
Malicious Activity Summary
XenorRat
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Checks computer location settings
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Program crash
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Scheduled Task/Job: Scheduled Task
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-07-04 11:41
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-04 11:41
Reported
2024-07-04 11:43
Platform
win7-20240220-en
Max time kernel
147s
Max time network
149s
Command Line
Signatures
XenorRat
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
Enumerates physical storage devices
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "dms" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFF94.tmp" /F
Network
| Country | Destination | Domain | Proto |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp |
Files
memory/1732-0-0x0000000073ECE000-0x0000000073ECF000-memory.dmp
memory/1732-1-0x0000000000D30000-0x0000000000D70000-memory.dmp
memory/1732-2-0x00000000002B0000-0x00000000002B6000-memory.dmp
memory/1732-3-0x0000000000680000-0x00000000006BE000-memory.dmp
memory/1732-4-0x0000000073EC0000-0x00000000745AE000-memory.dmp
memory/1732-5-0x00000000002C0000-0x00000000002C6000-memory.dmp
memory/2980-6-0x0000000000400000-0x0000000000412000-memory.dmp
memory/2980-16-0x0000000000400000-0x0000000000412000-memory.dmp
memory/2980-8-0x0000000000400000-0x0000000000412000-memory.dmp
memory/2132-26-0x0000000073EC0000-0x00000000745AE000-memory.dmp
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
| MD5 | cc5b6e9deec470d26e074859ca794aca |
| SHA1 | 0cf0d409f644c3712299b0c91ea249537d51ff45 |
| SHA256 | 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99 |
| SHA512 | bd97b5d8ef82d68dc1d0a2162375a6515b927be95e99dd6a4a725172da885eff4e162d80ad4bbac30b579d6e9fa3d6d73f452716239d61b7c01803afa653959d |
memory/2980-21-0x0000000073EC0000-0x00000000745AE000-memory.dmp
memory/2064-29-0x0000000000C40000-0x0000000000C80000-memory.dmp
memory/2980-28-0x0000000073EC0000-0x00000000745AE000-memory.dmp
memory/1732-19-0x0000000073EC0000-0x00000000745AE000-memory.dmp
memory/2132-45-0x0000000073EC0000-0x00000000745AE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpFF94.tmp
| MD5 | 15353a3bb0a5c558a81376bcdfdc6ad6 |
| SHA1 | 36156e5bd828094aacba26b60214420192009f01 |
| SHA256 | 66d9195ec358a9736be2517f55b02206baa72c2d08512474f474773bbef6ef3a |
| SHA512 | 331585e484b39553b5bb51745db450f46b1b75c04610eb50d1824a3a25c29c1c235212b52b1772205ce5c80643a77ef78eba3c3999cf2828c3645862e06cabb4 |
memory/2132-48-0x0000000073EC0000-0x00000000745AE000-memory.dmp
memory/2132-49-0x00000000054E0000-0x00000000055DA000-memory.dmp
memory/2132-65-0x0000000073EC0000-0x00000000745AE000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-04 11:41
Reported
2024-07-04 11:43
Platform
win10v2004-20240508-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
XenorRat
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4008 -ip 4008
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3192 -ip 3192
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 80
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 72
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1204 -ip 1204
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1888 -ip 1888
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 152
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 80
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "dms" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3459.tmp" /F
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| US | 8.8.8.8:53 | 167.248.92.91.in-addr.arpa | udp |
| US | 52.111.227.14:443 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp | |
| NL | 91.92.248.167:1280 | tcp |
Files
memory/4172-0-0x0000000074D3E000-0x0000000074D3F000-memory.dmp
memory/4172-1-0x0000000000320000-0x0000000000360000-memory.dmp
memory/4172-2-0x0000000002750000-0x0000000002756000-memory.dmp
memory/4172-3-0x0000000074D30000-0x00000000754E0000-memory.dmp
memory/4172-4-0x0000000004CF0000-0x0000000004D2E000-memory.dmp
memory/4172-5-0x000000000D930000-0x000000000D9CC000-memory.dmp
memory/4172-6-0x0000000004770000-0x0000000004776000-memory.dmp
memory/3176-8-0x0000000000400000-0x0000000000412000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fechas de pago.scr.exe.log
| MD5 | 8334a471a4b492ece225b471b8ad2fc8 |
| SHA1 | 1cb24640f32d23e8f7800bd0511b7b9c3011d992 |
| SHA256 | 5612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169 |
| SHA512 | 56ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36 |
memory/3176-12-0x0000000074D30000-0x00000000754E0000-memory.dmp
memory/4172-13-0x0000000074D30000-0x00000000754E0000-memory.dmp
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
| MD5 | cc5b6e9deec470d26e074859ca794aca |
| SHA1 | 0cf0d409f644c3712299b0c91ea249537d51ff45 |
| SHA256 | 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99 |
| SHA512 | bd97b5d8ef82d68dc1d0a2162375a6515b927be95e99dd6a4a725172da885eff4e162d80ad4bbac30b579d6e9fa3d6d73f452716239d61b7c01803afa653959d |
memory/1984-25-0x0000000074D30000-0x00000000754E0000-memory.dmp
memory/3176-24-0x0000000074D30000-0x00000000754E0000-memory.dmp
memory/1984-26-0x0000000074D30000-0x00000000754E0000-memory.dmp
memory/1984-33-0x0000000074D30000-0x00000000754E0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp3459.tmp
| MD5 | 8c9b557a6488ef9093caaccc60cc4223 |
| SHA1 | 31a072f552d65a4d60ee025b8a70d654d3093009 |
| SHA256 | 5a3ceafb68e10422476e8a783acd0b5881e6a21aa7f951841c54ad3cf138c357 |
| SHA512 | d07dabd8a01eebc2c10e3a82f157c300e5c2307a3aa5af69ddf8c47408a0f8db98e053204b69cace2da3314605de507b4ba54b010bafec6e8cf3c6de48cbb087 |
memory/2184-36-0x0000000005810000-0x0000000005876000-memory.dmp
memory/2184-37-0x0000000005A80000-0x0000000005B7A000-memory.dmp
memory/2184-38-0x0000000005D50000-0x0000000005F12000-memory.dmp
memory/2184-39-0x0000000005C10000-0x0000000005C86000-memory.dmp
memory/2184-40-0x0000000005C90000-0x0000000005CE0000-memory.dmp
memory/2184-41-0x0000000006450000-0x000000000697C000-memory.dmp
memory/2184-42-0x0000000006090000-0x00000000060AE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ryfn5r2f.i2w
| MD5 | 73bd1e15afb04648c24593e8ba13e983 |
| SHA1 | 4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91 |
| SHA256 | aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b |
| SHA512 | 6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7 |
C:\Users\Admin\AppData\Local\Temp\cqdm3a3c.sum
| MD5 | 9618e15b04a4ddb39ed6c496575f6f95 |
| SHA1 | 1c28f8750e5555776b3c80b187c5d15a443a7412 |
| SHA256 | a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab |
| SHA512 | f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26 |