Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe
Resource
win7-20240704-en
General
-
Target
ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe
-
Size
722KB
-
MD5
6958f2cfe61df82f5bcabf6cb0b8c89c
-
SHA1
434d562753173a6bff5515c0a366a2d1fd40748c
-
SHA256
ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4
-
SHA512
651ae1d93fc796498f2c89d9b097431c5c9ebdc58b3c2b84ddc6a608dd508c8dbcab7d1ba35f36a1cccd66f8ef835561a81de3fc1790e18775df69128182382d
-
SSDEEP
12288:HhqxSLo5C1Ps4Xhu913+wmwIzM31jXK1OkA+yE4Yku+z/JzWCzLFT086OjTve/:HHLmCiIha1OwvIzM31jaIZ+n4CChz//m
Malware Config
Extracted
xenorat
45.88.91.74
Xeno_rat_nd8912d
-
delay
10
-
install_path
appdata
-
port
1414
-
startup_name
nothingset
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2840 winrar.exe 1976 winrar.exe -
Loads dropped DLL 5 IoCs
pid Process 2816 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 2816 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 2816 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 2816 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 2840 winrar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe 1976 winrar.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1976 winrar.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2840 2816 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 31 PID 2816 wrote to memory of 2840 2816 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 31 PID 2816 wrote to memory of 2840 2816 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 31 PID 2816 wrote to memory of 2840 2816 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 31 PID 2840 wrote to memory of 1976 2840 winrar.exe 32 PID 2840 wrote to memory of 1976 2840 winrar.exe 32 PID 2840 wrote to memory of 1976 2840 winrar.exe 32 PID 2840 wrote to memory of 1976 2840 winrar.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe"C:\Users\Admin\AppData\Local\Temp\ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\winrar.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\winrar.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\XenoManager\winrar.exe"C:\Users\Admin\AppData\Roaming\XenoManager\winrar.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5a794ea1c458516d25edd383ec65abc4d
SHA11e212bf6a779399335eb2fe2d70aaac8308879af
SHA256871d0a8f64988d97ea856272a6fc1fc7f31be1439c4419df40115a1b2517862a
SHA5128fad150c1b1253f9537e5979b20705ebb514507ac6d4921f04670c931e5b36203bdcc70736b4bdeda3a477b3ce380ce1df44fe63b7d8658406e174ca4e910049
-
Filesize
45KB
MD5e60d1bc1956d7a26d6bff96386039a4a
SHA1947bebfaef5e6b9ad94277711e4e8eaca5eb625b
SHA2561703e46b5b3ea858997a91bbaf6ef73d24a0ef7c5559b06f28808a502e15f217
SHA512e80533c79ab8c2993847bfa0c421f7a99945cdda9a2ac9a9e17be83140101a79861ae1d0dbe9cd42a80877f6ef66bc7ab87b5d7b78f4ff17978a50939e96da9f