Analysis

  • max time kernel
    110s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-07-2024 22:56

General

  • Target

    1d63cb75b1ca78ae4d1cee75654bdb90N.exe

  • Size

    108KB

  • MD5

    1d63cb75b1ca78ae4d1cee75654bdb90

  • SHA1

    c51f296c4b760136b8f4a31fbad64c8a2bec8034

  • SHA256

    ebe3929423c5b81a03ec31feddd6a59a2ad2a40d40a14d1b3de437080f8462f2

  • SHA512

    82d71c26147ecc6b7e9f97cee55b8ac5c8f65621857a353b90a34e9affa97e3103fc19c16b546058f58cfc53e597167c2f35e36855d026a7afe582e463a132e6

  • SSDEEP

    1536:8rlp5ARyYhD3aq0rCjt4SYvHFOK8LRP60P7UHNvZXY8XYj8GbYF6ocdP4Ppfn6y:8rljARyYVa9zfFBOStvS3j8G9dgPpfp

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

193.222.96.58

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    1414

  • startup_name

    nothingset

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d63cb75b1ca78ae4d1cee75654bdb90N.exe
    "C:\Users\Admin\AppData\Local\Temp\1d63cb75b1ca78ae4d1cee75654bdb90N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\AppData\Roaming\XenoManager\1d63cb75b1ca78ae4d1cee75654bdb90N.exe
      "C:\Users\Admin\AppData\Roaming\XenoManager\1d63cb75b1ca78ae4d1cee75654bdb90N.exe"
      2⤵
      • Executes dropped EXE
      PID:3948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\1d63cb75b1ca78ae4d1cee75654bdb90N.exe.log

    Filesize

    425B

    MD5

    fff5cbccb6b31b40f834b8f4778a779a

    SHA1

    899ed0377e89f1ed434cfeecc5bc0163ebdf0454

    SHA256

    b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76

    SHA512

    1a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9

  • C:\Users\Admin\AppData\Roaming\XenoManager\1d63cb75b1ca78ae4d1cee75654bdb90N.exe

    Filesize

    108KB

    MD5

    1d63cb75b1ca78ae4d1cee75654bdb90

    SHA1

    c51f296c4b760136b8f4a31fbad64c8a2bec8034

    SHA256

    ebe3929423c5b81a03ec31feddd6a59a2ad2a40d40a14d1b3de437080f8462f2

    SHA512

    82d71c26147ecc6b7e9f97cee55b8ac5c8f65621857a353b90a34e9affa97e3103fc19c16b546058f58cfc53e597167c2f35e36855d026a7afe582e463a132e6

  • memory/3948-20-0x00007FFB3E4C0000-0x00007FFB3EF81000-memory.dmp

    Filesize

    10.8MB

  • memory/3948-21-0x00000000014C0000-0x00000000014D4000-memory.dmp

    Filesize

    80KB

  • memory/3948-22-0x00007FFB3E4C0000-0x00007FFB3EF81000-memory.dmp

    Filesize

    10.8MB

  • memory/3948-23-0x00007FFB3E4C0000-0x00007FFB3EF81000-memory.dmp

    Filesize

    10.8MB

  • memory/3948-24-0x00007FFB3E4C0000-0x00007FFB3EF81000-memory.dmp

    Filesize

    10.8MB

  • memory/4636-3-0x00000000007E0000-0x00000000007F4000-memory.dmp

    Filesize

    80KB

  • memory/4636-4-0x00000000020D0000-0x00000000020E2000-memory.dmp

    Filesize

    72KB

  • memory/4636-6-0x00007FFB3E4C0000-0x00007FFB3EF81000-memory.dmp

    Filesize

    10.8MB

  • memory/4636-2-0x0000000000800000-0x000000000081C000-memory.dmp

    Filesize

    112KB

  • memory/4636-1-0x0000000000010000-0x0000000000030000-memory.dmp

    Filesize

    128KB

  • memory/4636-19-0x00007FFB3E4C0000-0x00007FFB3EF81000-memory.dmp

    Filesize

    10.8MB

  • memory/4636-0-0x00007FFB3E4C3000-0x00007FFB3E4C5000-memory.dmp

    Filesize

    8KB