Analysis

  • max time kernel
    1783s
  • max time network
    1804s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-07-2024 13:05

General

  • Target

    pegasus.exe

  • Size

    45KB

  • MD5

    f9a1750cd762fa4fb79b79161b0427ea

  • SHA1

    59aad082ead63005a62d0401649420768227c049

  • SHA256

    53b919493ccf56d390b44b53fa6b28d723bc0483790914792f100827798afdd0

  • SHA512

    f712cf63c5d747158f9829bc036fd2c06bb51dc211b1b9473a9df843b0d2c35ae3e849908cdeed9b7b23e66e33bfffeb34b0c73688daca211787c3b07a79377d

  • SSDEEP

    768:ldhO/poiiUcjlJIn4hYH9Xqk5nWEZ5SbTDaxuI7CPW5p:7w+jjgn4SH9XqcnW85SbTsuIx

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

192.168.0.48

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    JavaUpdater

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pegasus.exe
    "C:\Users\Admin\AppData\Local\Temp\pegasus.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Roaming\XenoManager\pegasus.exe
      "C:\Users\Admin\AppData\Roaming\XenoManager\pegasus.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "JavaUpdater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5E33.tmp" /F
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp5E33.tmp

    Filesize

    1KB

    MD5

    2130e8679b94e51b8f2b5f693605a59e

    SHA1

    e088d5d0da43302043ff774d0af0d2a1a5144527

    SHA256

    153d87e6590c23a16a2f3b62568cf40321ec016daa88bcab57f8a24e0fb2a0dd

    SHA512

    aa985852accc59fadcdce709fab999ee12544e1abdbcf960faff9a78fd4842615b4a2d406bb88d7874013daeba3659b9f6f4789e1a3063728d7b8e55e51b3c2d

  • C:\Users\Admin\AppData\Roaming\XenoManager\pegasus.exe

    Filesize

    45KB

    MD5

    f9a1750cd762fa4fb79b79161b0427ea

    SHA1

    59aad082ead63005a62d0401649420768227c049

    SHA256

    53b919493ccf56d390b44b53fa6b28d723bc0483790914792f100827798afdd0

    SHA512

    f712cf63c5d747158f9829bc036fd2c06bb51dc211b1b9473a9df843b0d2c35ae3e849908cdeed9b7b23e66e33bfffeb34b0c73688daca211787c3b07a79377d

  • memory/864-8-0x0000000073240000-0x000000007392E000-memory.dmp

    Filesize

    6.9MB

  • memory/864-11-0x0000000073240000-0x000000007392E000-memory.dmp

    Filesize

    6.9MB

  • memory/5028-0-0x000000007324E000-0x000000007324F000-memory.dmp

    Filesize

    4KB

  • memory/5028-1-0x0000000000E60000-0x0000000000E72000-memory.dmp

    Filesize

    72KB