Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2024 16:56

General

  • Target

    xeno rat server.exe

  • Size

    2.0MB

  • MD5

    3987ee127f2a2cf8a29573d4e111a8e8

  • SHA1

    fc253131e832297967f93190217f0ce403e38cb0

  • SHA256

    3d00a800474ddf382212e003222805bd74665b69cec43b554f91c3cd9edf04c4

  • SHA512

    69d5ac7a691dde1a3ed7f495e9b9180e63152ddaaa3d1b596ad9cbeb4d7b088f3fc4b138ecf87070014cdfa9047be18940b720de60642389921a10053250787b

  • SSDEEP

    49152:EnxkNTRWjxoJochWQI3kqXfd+/9AManGhR0vNgtIeGWtOc5Q:ExkNTcaJhDI3kqXf0FtWykQDCiQ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 12 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xeno rat server.exe
    "C:\Users\Admin\AppData\Local\Temp\xeno rat server.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2252
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:3036
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
      1⤵
        PID:2536
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x180
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1348

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Desktop\RCX98E7.tmp

        Filesize

        45KB

        MD5

        ef6d118119e5876f18e4d2fb31318dee

        SHA1

        cb34fdb6f5d74ee61258dc44f80442785c0fcae9

        SHA256

        46b3c6e5422bdb8956a36cb2a23cd15793ef8c218d57b3577af52ba5533ad81e

        SHA512

        a4b4a41837a0784b39a73dde151ac34d3245d625c4ba5122c57c10e5a58e1e6db33a57076bc2c7e43abf3602add2948898404a5062ec3d2a67c7ed8c7fe15243

      • C:\Users\Admin\Desktop\gta.exe

        Filesize

        45KB

        MD5

        f7aac19449f32a2498563dc12383a9c0

        SHA1

        a1df6f69c384e492dbab7f4755ecbe2c61f65deb

        SHA256

        0a8e9065a028f753145d049ab76d7c131bd9f3a728e2b9e71afacb9e27cc0da1

        SHA512

        cfa06eb218434dfca66d397472782c06674431e78fbaa175c7765de12bd880db5a16a6991ba74880b2d3f6a0cafea0287a359a167f53797a4aa9a23dfce2b877

      • memory/2252-10-0x0000000074AD0000-0x00000000751BE000-memory.dmp

        Filesize

        6.9MB

      • memory/2252-11-0x0000000074AD0000-0x00000000751BE000-memory.dmp

        Filesize

        6.9MB

      • memory/2252-4-0x0000000000510000-0x000000000052A000-memory.dmp

        Filesize

        104KB

      • memory/2252-5-0x0000000000680000-0x0000000000692000-memory.dmp

        Filesize

        72KB

      • memory/2252-6-0x0000000004FB0000-0x0000000005062000-memory.dmp

        Filesize

        712KB

      • memory/2252-9-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

        Filesize

        4KB

      • memory/2252-0-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

        Filesize

        4KB

      • memory/2252-3-0x00000000002A0000-0x00000000002B4000-memory.dmp

        Filesize

        80KB

      • memory/2252-14-0x00000000089A0000-0x0000000008AC4000-memory.dmp

        Filesize

        1.1MB

      • memory/2252-15-0x0000000000BC0000-0x0000000000BDA000-memory.dmp

        Filesize

        104KB

      • memory/2252-16-0x0000000008B00000-0x0000000008B02000-memory.dmp

        Filesize

        8KB

      • memory/2252-17-0x0000000074AD0000-0x00000000751BE000-memory.dmp

        Filesize

        6.9MB

      • memory/2252-2-0x0000000074AD0000-0x00000000751BE000-memory.dmp

        Filesize

        6.9MB

      • memory/2252-1-0x0000000000E40000-0x0000000001042000-memory.dmp

        Filesize

        2.0MB