Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2024 22:56

General

  • Target

    1d63cb75b1ca78ae4d1cee75654bdb90N.exe

  • Size

    108KB

  • MD5

    1d63cb75b1ca78ae4d1cee75654bdb90

  • SHA1

    c51f296c4b760136b8f4a31fbad64c8a2bec8034

  • SHA256

    ebe3929423c5b81a03ec31feddd6a59a2ad2a40d40a14d1b3de437080f8462f2

  • SHA512

    82d71c26147ecc6b7e9f97cee55b8ac5c8f65621857a353b90a34e9affa97e3103fc19c16b546058f58cfc53e597167c2f35e36855d026a7afe582e463a132e6

  • SSDEEP

    1536:8rlp5ARyYhD3aq0rCjt4SYvHFOK8LRP60P7UHNvZXY8XYj8GbYF6ocdP4Ppfn6y:8rljARyYVa9zfFBOStvS3j8G9dgPpfp

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

193.222.96.58

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    1414

  • startup_name

    nothingset

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d63cb75b1ca78ae4d1cee75654bdb90N.exe
    "C:\Users\Admin\AppData\Local\Temp\1d63cb75b1ca78ae4d1cee75654bdb90N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Roaming\XenoManager\1d63cb75b1ca78ae4d1cee75654bdb90N.exe
      "C:\Users\Admin\AppData\Roaming\XenoManager\1d63cb75b1ca78ae4d1cee75654bdb90N.exe"
      2⤵
      • Executes dropped EXE
      PID:2292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\XenoManager\1d63cb75b1ca78ae4d1cee75654bdb90N.exe

    Filesize

    108KB

    MD5

    1d63cb75b1ca78ae4d1cee75654bdb90

    SHA1

    c51f296c4b760136b8f4a31fbad64c8a2bec8034

    SHA256

    ebe3929423c5b81a03ec31feddd6a59a2ad2a40d40a14d1b3de437080f8462f2

    SHA512

    82d71c26147ecc6b7e9f97cee55b8ac5c8f65621857a353b90a34e9affa97e3103fc19c16b546058f58cfc53e597167c2f35e36855d026a7afe582e463a132e6

  • memory/2292-13-0x0000000000D00000-0x0000000000D20000-memory.dmp

    Filesize

    128KB

  • memory/2292-12-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2292-15-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2292-16-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2292-17-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2580-2-0x0000000000530000-0x000000000054C000-memory.dmp

    Filesize

    112KB

  • memory/2580-3-0x0000000000550000-0x0000000000564000-memory.dmp

    Filesize

    80KB

  • memory/2580-4-0x0000000000560000-0x0000000000572000-memory.dmp

    Filesize

    72KB

  • memory/2580-7-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2580-1-0x00000000000C0000-0x00000000000E0000-memory.dmp

    Filesize

    128KB

  • memory/2580-14-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2580-0-0x000007FEF5263000-0x000007FEF5264000-memory.dmp

    Filesize

    4KB