Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11-07-2024 13:31

General

  • Target

    SecuriteInfo.com.Trojan.Inject5.5521.21793.4561.exe

  • Size

    733KB

  • MD5

    3920c23bc5bf04211bf972aca575e55b

  • SHA1

    93537135ee51857248063359e2ba73c3c66bf98f

  • SHA256

    27e2394f7b506257a8afa48049a8fe2fef59dc87957def06bd51d1d9dc191732

  • SHA512

    7c93bee505f7ea9f831533d707329b85089c953263b7916806822d8b6d22593691ee47d6254b9ecaf5c96abe1f2938bbb9fef4bd95124d5e906e677490546972

  • SSDEEP

    12288:PWuMuanZhZGbaWuMuanZhZGb3LAPlJ8/6vrQUACkQvBKS/L8pi9mQ47:yueZG3ueZGeS6LYQ

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

77.221.152.198

Mutex

Xeno_rat_nd89dsedwqdswdqwdwqdqwdqwdwqdwqdqwdqwdwqdwqd12d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    nothingset

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Inject5.5521.21793.4561.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Inject5.5521.21793.4561.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ian21vju\ian21vju.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1A92.tmp" "c:\Users\Admin\AppData\Local\Temp\ian21vju\CSCA1B6B32F3A7B427C969259BB785C15E5.TMP"
        3⤵
          PID:2768
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:2664
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Users\Admin\AppData\Roaming\XenoManager\RegAsm.exe
            "C:\Users\Admin\AppData\Roaming\XenoManager\RegAsm.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2708

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES1A92.tmp

        Filesize

        1KB

        MD5

        87d45bcfea828e78c88273af138c3667

        SHA1

        b21e89ead47d34139d13092f6355c09aab29838a

        SHA256

        467757bea677a0188d174a6ffbcf53ee0c960a3d831a81777480a398616ae711

        SHA512

        b30b18f9591ab218edef8356df1c30a1e823fd864a29a7a43263c3e1e6e3e2499210c137821585909721a3a6ca898fff7d5b9137260889b52a5c5995b432a0e8

      • C:\Users\Admin\AppData\Local\Temp\ian21vju\ian21vju.dll

        Filesize

        4KB

        MD5

        f37b74ec4d4b6eee76887c9cd54db459

        SHA1

        2c65f1c13eba16f5921f9e07cc59bc371edde967

        SHA256

        9e741393c8f8a4eb9e70b35a23a99fc19008d61fa6ad14717d5a2ffc4edcd6a0

        SHA512

        a6ebcaac6d230b34346ad04d5c03102c4a941798b0235427d60f2f882341eee7cb796234f04992efb216af487d949891e0ab9be202f33ba3d5167a5a8ac72fb5

      • \??\c:\Users\Admin\AppData\Local\Temp\ian21vju\CSCA1B6B32F3A7B427C969259BB785C15E5.TMP

        Filesize

        652B

        MD5

        e95eebb12d4701ed86c450ae99f0ca03

        SHA1

        0ea01d9ef24568d54ab41ded1b013f6d74deae21

        SHA256

        d0ee3a106e64ef47d1d27902e7e424aa7c0b8557f35207b06e3de148487d390a

        SHA512

        2348431402e16121e223e9e059dda479f41df4c4b8ce45a992c16179c4b2ca142bdfc3c01135bea9551f115831c590665ee3ae53bf32a85cc92097e943cbfcf1

      • \??\c:\Users\Admin\AppData\Local\Temp\ian21vju\ian21vju.0.cs

        Filesize

        1KB

        MD5

        c32c2c327b1cbd6bc40811906085e443

        SHA1

        3dd38840e4943f8c8d2e3322c7fe07471ca6efad

        SHA256

        aae5d17321d66991f73705f6c75048ee4d63b0505a428e59789991ca35865de6

        SHA512

        36686fbfba241be09de60f7c8eb78aefb94f96831a212e6f2ed5e5b73ea9599b8a55a3097436ea486c063507c49e453e523df4a16305ca28d05a53a4fe7f4c70

      • \??\c:\Users\Admin\AppData\Local\Temp\ian21vju\ian21vju.cmdline

        Filesize

        204B

        MD5

        c55997db7e0d18a9f13141da69272699

        SHA1

        f90806e0cb9e5215921c1e3571a43ceef98531f9

        SHA256

        6913f8cf05ee89eeda37005735f3bab6f9b1e6d65d319d739cdd8e850f440502

        SHA512

        e9735ee8e2ba84c6faecf523f2e3a227a65199b98da91254dcf5acf8f47fcbf4e24f5e6442c020442bd566bc0194455125287d10a03bdff63f989f1f9698d991

      • \Users\Admin\AppData\Roaming\XenoManager\RegAsm.exe

        Filesize

        63KB

        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • memory/2708-42-0x0000000000C50000-0x0000000000C62000-memory.dmp

        Filesize

        72KB

      • memory/2836-18-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2836-22-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2836-29-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2836-33-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2836-24-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2836-27-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2836-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2836-20-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2852-15-0x0000000000490000-0x0000000000498000-memory.dmp

        Filesize

        32KB

      • memory/2852-32-0x0000000074AC0000-0x00000000751AE000-memory.dmp

        Filesize

        6.9MB

      • memory/2852-0-0x0000000074ACE000-0x0000000074ACF000-memory.dmp

        Filesize

        4KB

      • memory/2852-17-0x0000000000510000-0x0000000000538000-memory.dmp

        Filesize

        160KB

      • memory/2852-7-0x0000000074AC0000-0x00000000751AE000-memory.dmp

        Filesize

        6.9MB

      • memory/2852-1-0x0000000000F80000-0x000000000103C000-memory.dmp

        Filesize

        752KB