Analysis
-
max time kernel
1795s -
max time network
1700s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 20:21
Behavioral task
behavioral1
Sample
KNRL STARTUP/KNRL.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
KNRL STARTUP/KNRL.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
KNRLBOOTSTRAPPER.exe
Resource
win7-20240704-en
General
-
Target
KNRL STARTUP/KNRL.exe
-
Size
468KB
-
MD5
25dd17cdd4cb0ea687bacc96f11df77f
-
SHA1
e35e77bbdea42a36fe4d2f456022ab07ddc1a65f
-
SHA256
8fb40c856daf038d45a2d5b5f93bfa48987d54493b43ac76c16a7fceb7011f86
-
SHA512
3144c457786e9764d8ea026d1c312e90e5158507b1133e3e477922c54a721ac29a1014d8103aba592fe2b65e831dbb8d5362968c588824894afe77de04968799
-
SSDEEP
6144:SWV91Ub+4jU83nN6xMrSTpNx+NgrnpGH2bRr:SiTXx
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
Xeno_manager.exe
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2968 2264 KNRL.exe 30 PID 2264 wrote to memory of 2968 2264 KNRL.exe 30 PID 2264 wrote to memory of 2968 2264 KNRL.exe 30 PID 2264 wrote to memory of 2968 2264 KNRL.exe 30 PID 2716 wrote to memory of 2820 2716 chrome.exe 33 PID 2716 wrote to memory of 2820 2716 chrome.exe 33 PID 2716 wrote to memory of 2820 2716 chrome.exe 33 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1396 2716 chrome.exe 35 PID 2716 wrote to memory of 1676 2716 chrome.exe 36 PID 2716 wrote to memory of 1676 2716 chrome.exe 36 PID 2716 wrote to memory of 1676 2716 chrome.exe 36 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37 PID 2716 wrote to memory of 2880 2716 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\KNRL STARTUP\KNRL.exe"C:\Users\Admin\AppData\Local\Temp\KNRL STARTUP\KNRL.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Xeno_manager.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2A0.tmp" /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef73e9758,0x7fef73e9768,0x7fef73e97782⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1216,i,16138160071047690468,1137463994700234116,131072 /prefetch:22⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1216,i,16138160071047690468,1137463994700234116,131072 /prefetch:82⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1216,i,16138160071047690468,1137463994700234116,131072 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2168 --field-trial-handle=1216,i,16138160071047690468,1137463994700234116,131072 /prefetch:12⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2184 --field-trial-handle=1216,i,16138160071047690468,1137463994700234116,131072 /prefetch:12⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2704 --field-trial-handle=1216,i,16138160071047690468,1137463994700234116,131072 /prefetch:22⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3340 --field-trial-handle=1216,i,16138160071047690468,1137463994700234116,131072 /prefetch:12⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 --field-trial-handle=1216,i,16138160071047690468,1137463994700234116,131072 /prefetch:82⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
1KB
MD5911da64ab84b853573e7ea3f267760be
SHA1891cd53eb6662e6fe7dd2a801d7ce9c5002ecd84
SHA2561406bab9eb91b11f73cb99737bc30ad31652911fd46a389a6bec71051b395243
SHA512ff8c4c8a4d437f4864bd50d37317f3bdabbb3334c7edb0f37643de6666c5ec37751285ac3d451eeb90636ae646c860d9894e27ba9b9003a99926b7cbfab69caa
-
Filesize
987B
MD5a178bdc0a54c70d4c5b6c011990eeb98
SHA19c12fa8ce470ddd52db7507f09c78ea6617305df
SHA256356d9fbbe1143012da2e48e974a8d187ad23e4e4e984ebdd493d7aa3b924272e
SHA512c553309692df155a39083c1eb81977440af73d9e346b928d701d7ff245f47d440c07184ae4134fb6c0bbb09e51af31647b4ba8914c54b0a289aa484826b57ee2
-
Filesize
5KB
MD5fb972f673640bf29db64c38261d8b3c9
SHA1dc7f858ef95a4409b6c99db31d898daf291fbee0
SHA2563323167f3da2c5e33766dbd3f3bf2ccf51e102f7340a1b58ed4555938f132220
SHA51262699f9604f1532dcdb7f55686084d530afa67edd6de59f10742eb6750eb0369c0aeee6fad70eca2fe50b267dcc83619b566fb9923c69a9e67e8abe2ff805298
-
Filesize
5KB
MD5846feb39fe0978e9fc7d11bdd6697a71
SHA1a05125a795d0e5589a8078a8fb7b20b2cddd31cb
SHA256fdf23292731752cff93ce60102fac2339f25dbae772ddf21887b6ce449550772
SHA51264884129063db580add73e91df061f42d21232250fa32e545f461828589fda1e9824edd9522709fcd1213605ac8c82f7c7b6c850228fd049b04eaee1589f1d7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1KB
MD561a865f9095e54fead6e20d6d06862c6
SHA12313a3396aa33792d1054c82f4d99c85fdaf93b2
SHA256c007407ab7a371ad9de4c3d7929c08e30f50836d32666101084691a7a8462b47
SHA5123e0c1caba39af50f2633d1264a5eaf756b1218a104f6dc77fcfb9c64dfb079d97d71f41404c7d8b216330bb44c1b6349b3431de59363e581225ce5f5e5b0b1d3