Analysis
-
max time kernel
1793s -
max time network
1475s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-07-2024 05:09
General
-
Target
setup.exe
-
Size
45KB
-
MD5
a895d7d9f0c011e6a09f8695f70ec220
-
SHA1
6e35cb9b2e0ffab5473b00021214e903509ed631
-
SHA256
b9b83591b6ebb1d96f9663e95b330f628f294fa8f6bb7703a6f3c9333b7e1c93
-
SHA512
87f0fd72d1e15a0748db53ce174c5aae33c72654fd6821d4582f5711432f6a070b0b619f5b244f932d7b3a86ab269f06ab43baa308bbc52e46837adac2a48926
-
SSDEEP
768:FdhO/poiiUcjlJInozH9Xqk5nWEZ5SbTDaDWI7CPW59:bw+jjgn6H9XqcnW85SbTyWIV
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
1000
-
startup_name
setup
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4972 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3766757357-1293853516-507035944-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3632 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3728 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4972 4048 setup.exe 81 PID 4048 wrote to memory of 4972 4048 setup.exe 81 PID 4048 wrote to memory of 4972 4048 setup.exe 81 PID 4972 wrote to memory of 3632 4972 setup.exe 83 PID 4972 wrote to memory of 3632 4972 setup.exe 83 PID 4972 wrote to memory of 3632 4972 setup.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Roaming\XenoManager\setup.exe"C:\Users\Admin\AppData\Roaming\XenoManager\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "setup" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE57E.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:3632
-
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3728
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
1KB
MD52c5b98de34e8228ece345d2dd14c3943
SHA1fe7cbb38178e1639130e65123028041e9f28608d
SHA256366aab4e56302e176927602e25169babbe9e5680431472db640c35919f9169cd
SHA512e9b5d626c704c548f6f644c065e41d67027a5fc6b5d13cd995d0bac94fcca6aa4b9ae9a2c32d2ef3421b85cfb57c8993239f15b4f13dd894b7beffe748c8c27d
-
Filesize
45KB
MD5a895d7d9f0c011e6a09f8695f70ec220
SHA16e35cb9b2e0ffab5473b00021214e903509ed631
SHA256b9b83591b6ebb1d96f9663e95b330f628f294fa8f6bb7703a6f3c9333b7e1c93
SHA51287f0fd72d1e15a0748db53ce174c5aae33c72654fd6821d4582f5711432f6a070b0b619f5b244f932d7b3a86ab269f06ab43baa308bbc52e46837adac2a48926