Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 17:18
Behavioral task
behavioral1
Sample
Rat Testing/Lime Rat.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Rat Testing/Lime Rat.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Rat Testing/Xeno Rat.exe
Resource
win7-20240419-en
General
-
Target
Rat Testing/Xeno Rat.exe
-
Size
45KB
-
MD5
5bf8a2aeedfb1123eb10af5e0f0e3302
-
SHA1
cdb9c4090f4ff8b9a5d94eaae30c15f4916e177a
-
SHA256
bf0927a0af35c23071466397ab21b38951d5847a4c7dda419d83a1a98183b12f
-
SHA512
3fa42409cea75c32b6323567fd7f03f10fd220fd73a93e4ba4d6bf998b228377e404d1a050f32e952b742c8d89a7e2384c14129608814711e285bfad33024983
-
SSDEEP
768:FdhO/poiiUcjlJInrVH9Xqk5nWEZ5SbTDazuI7CPW5j:bw+jjgnRH9XqcnW85SbT2uIb
Malware Config
Extracted
xenorat
147.185.221.20
TestingRat
-
install_path
appdata
-
port
3403
-
startup_name
Console
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2112 Xeno Rat.exe -
Loads dropped DLL 1 IoCs
pid Process 2288 Xeno Rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2368 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2112 2288 Xeno Rat.exe 28 PID 2288 wrote to memory of 2112 2288 Xeno Rat.exe 28 PID 2288 wrote to memory of 2112 2288 Xeno Rat.exe 28 PID 2288 wrote to memory of 2112 2288 Xeno Rat.exe 28 PID 2112 wrote to memory of 2368 2112 Xeno Rat.exe 29 PID 2112 wrote to memory of 2368 2112 Xeno Rat.exe 29 PID 2112 wrote to memory of 2368 2112 Xeno Rat.exe 29 PID 2112 wrote to memory of 2368 2112 Xeno Rat.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rat Testing\Xeno Rat.exe"C:\Users\Admin\AppData\Local\Temp\Rat Testing\Xeno Rat.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Roaming\XenoManager\Xeno Rat.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Xeno Rat.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Console" /XML "C:\Users\Admin\AppData\Local\Temp\tmp58C.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50e29fbc9d75d451bb7b67f39780c4a90
SHA1e1029b49a55d95816055da478445478d019b8683
SHA25634268bc2fe7b655c624dfba5e5740aa5d8c816d13e917a46211c746ae4ab8bf9
SHA512817216c5022e6faee6ef3f35f57d6e7d1238333c461c6dffc2c77f332a670ea0e772f2f910e45ef76c36427bec36f16c55e2fb9ce11f11e0a465c3980e6f1a1c
-
Filesize
45KB
MD55bf8a2aeedfb1123eb10af5e0f0e3302
SHA1cdb9c4090f4ff8b9a5d94eaae30c15f4916e177a
SHA256bf0927a0af35c23071466397ab21b38951d5847a4c7dda419d83a1a98183b12f
SHA5123fa42409cea75c32b6323567fd7f03f10fd220fd73a93e4ba4d6bf998b228377e404d1a050f32e952b742c8d89a7e2384c14129608814711e285bfad33024983