Analysis
-
max time kernel
1793s -
max time network
1146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 20:21
Behavioral task
behavioral1
Sample
KNRL STARTUP/KNRL.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
KNRL STARTUP/KNRL.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
KNRLBOOTSTRAPPER.exe
Resource
win7-20240704-en
General
-
Target
KNRL STARTUP/KNRL.exe
-
Size
468KB
-
MD5
25dd17cdd4cb0ea687bacc96f11df77f
-
SHA1
e35e77bbdea42a36fe4d2f456022ab07ddc1a65f
-
SHA256
8fb40c856daf038d45a2d5b5f93bfa48987d54493b43ac76c16a7fceb7011f86
-
SHA512
3144c457786e9764d8ea026d1c312e90e5158507b1133e3e477922c54a721ac29a1014d8103aba592fe2b65e831dbb8d5362968c588824894afe77de04968799
-
SSDEEP
6144:SWV91Ub+4jU83nN6xMrSTpNx+NgrnpGH2bRr:SiTXx
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
Xeno_manager.exe
Signatures
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4800 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2060 wrote to memory of 4800 2060 KNRL.exe 91 PID 2060 wrote to memory of 4800 2060 KNRL.exe 91 PID 2060 wrote to memory of 4800 2060 KNRL.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\KNRL STARTUP\KNRL.exe"C:\Users\Admin\AppData\Local\Temp\KNRL STARTUP\KNRL.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Xeno_manager.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC37F.tmp" /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:4800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561a865f9095e54fead6e20d6d06862c6
SHA12313a3396aa33792d1054c82f4d99c85fdaf93b2
SHA256c007407ab7a371ad9de4c3d7929c08e30f50836d32666101084691a7a8462b47
SHA5123e0c1caba39af50f2633d1264a5eaf756b1218a104f6dc77fcfb9c64dfb079d97d71f41404c7d8b216330bb44c1b6349b3431de59363e581225ce5f5e5b0b1d3