Analysis
-
max time kernel
1791s -
max time network
1562s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 20:21
Behavioral task
behavioral1
Sample
KNRL STARTUP/KNRL.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
KNRL STARTUP/KNRL.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
KNRLBOOTSTRAPPER.exe
Resource
win7-20240704-en
General
-
Target
KNRLBOOTSTRAPPER.exe
-
Size
468KB
-
MD5
25dd17cdd4cb0ea687bacc96f11df77f
-
SHA1
e35e77bbdea42a36fe4d2f456022ab07ddc1a65f
-
SHA256
8fb40c856daf038d45a2d5b5f93bfa48987d54493b43ac76c16a7fceb7011f86
-
SHA512
3144c457786e9764d8ea026d1c312e90e5158507b1133e3e477922c54a721ac29a1014d8103aba592fe2b65e831dbb8d5362968c588824894afe77de04968799
-
SSDEEP
6144:SWV91Ub+4jU83nN6xMrSTpNx+NgrnpGH2bRr:SiTXx
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
Xeno_manager.exe
Signatures
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2360 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2360 1876 KNRLBOOTSTRAPPER.exe 31 PID 1876 wrote to memory of 2360 1876 KNRLBOOTSTRAPPER.exe 31 PID 1876 wrote to memory of 2360 1876 KNRLBOOTSTRAPPER.exe 31 PID 1876 wrote to memory of 2360 1876 KNRLBOOTSTRAPPER.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\KNRLBOOTSTRAPPER.exe"C:\Users\Admin\AppData\Local\Temp\KNRLBOOTSTRAPPER.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Xeno_manager.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1777.tmp" /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52b3aa48a0fac3f7785fd4459aed94896
SHA15be79583c2c86b1bd4b0a349c7d2f6de9c8c9dee
SHA2562922d985008b899643fafd568599e9e5f3556aee099ecb6c298f959e750240b6
SHA51279ce866b4cbeb774e6cc3bce4e3024f27d65ffb896cee6c36ddba7757ef4b9ae3f8fd7ac6c7777be1880b2bc7bc636bc0b37a72fa7c197fd6fc420efc47c18d0