Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe
Resource
win7-20240704-en
General
-
Target
ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe
-
Size
722KB
-
MD5
6958f2cfe61df82f5bcabf6cb0b8c89c
-
SHA1
434d562753173a6bff5515c0a366a2d1fd40748c
-
SHA256
ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4
-
SHA512
651ae1d93fc796498f2c89d9b097431c5c9ebdc58b3c2b84ddc6a608dd508c8dbcab7d1ba35f36a1cccd66f8ef835561a81de3fc1790e18775df69128182382d
-
SSDEEP
12288:HhqxSLo5C1Ps4Xhu913+wmwIzM31jXK1OkA+yE4Yku+z/JzWCzLFT086OjTve/:HHLmCiIha1OwvIzM31jaIZ+n4CChz//m
Malware Config
Extracted
xenorat
45.88.91.74
Xeno_rat_nd8912d
-
delay
10
-
install_path
appdata
-
port
1414
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation winrar.exe -
Executes dropped EXE 2 IoCs
pid Process 1308 winrar.exe 3556 winrar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 792 wrote to memory of 1308 792 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 81 PID 792 wrote to memory of 1308 792 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 81 PID 792 wrote to memory of 1308 792 ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe 81 PID 1308 wrote to memory of 3556 1308 winrar.exe 83 PID 1308 wrote to memory of 3556 1308 winrar.exe 83 PID 1308 wrote to memory of 3556 1308 winrar.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe"C:\Users\Admin\AppData\Local\Temp\ce68403f6ca4534a1fb920c3981853761d7e0287da097285d7ceb676f51475f4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\winrar.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\winrar.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Roaming\XenoManager\winrar.exe"C:\Users\Admin\AppData\Roaming\XenoManager\winrar.exe"3⤵
- Executes dropped EXE
PID:3556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD5e60d1bc1956d7a26d6bff96386039a4a
SHA1947bebfaef5e6b9ad94277711e4e8eaca5eb625b
SHA2561703e46b5b3ea858997a91bbaf6ef73d24a0ef7c5559b06f28808a502e15f217
SHA512e80533c79ab8c2993847bfa0c421f7a99945cdda9a2ac9a9e17be83140101a79861ae1d0dbe9cd42a80877f6ef66bc7ab87b5d7b78f4ff17978a50939e96da9f