Analysis

  • max time kernel
    142s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 20:12

General

  • Target

    f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714.exe

  • Size

    45KB

  • MD5

    24cd3bf3db0659796d6df7ca25aaa8e5

  • SHA1

    9b6b6abad7f003cf4d14625cf8eb119ff00a29a9

  • SHA256

    f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714

  • SHA512

    5dd98bdde5a47c127d6ae90ab6d9d752b126b2c5ccae72296450c5ac6d552475180a995fb476c96b4ed443f9f5fc3a4e85536180eecb22ed87b45adee547c6ca

  • SSDEEP

    768:ZdhO/poiiUcjlJInaCLue9H9Xqk5nWEZ5SbTDaQWI7CPW5I:Xw+jjgn1ye9H9XqcnW85SbTRWIA

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    Windows Updater

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714.exe
    "C:\Users\Admin\AppData\Local\Temp\f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Roaming\XenoManager\f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714.exe
      "C:\Users\Admin\AppData\Roaming\XenoManager\f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1300
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "Windows Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp22CC.tmp" /F
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp22CC.tmp

    Filesize

    1KB

    MD5

    f80850bbec1420fd984dfdbf77270bcb

    SHA1

    8acd254e2fdd1d093a041ec5e1532e2522b1850b

    SHA256

    5238c97d9fd3d03d76a56798b9db826536b094129807780a14560074df7fcf46

    SHA512

    a53417653b3a8eea5654b90573b6fa066197147b29d8f479157c4bda53432832ef99a541b912de8e39a9b05b53ec49bd2dfd23766208a60c882b019fd08c2a03

  • \Users\Admin\AppData\Roaming\XenoManager\f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714.exe

    Filesize

    45KB

    MD5

    24cd3bf3db0659796d6df7ca25aaa8e5

    SHA1

    9b6b6abad7f003cf4d14625cf8eb119ff00a29a9

    SHA256

    f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714

    SHA512

    5dd98bdde5a47c127d6ae90ab6d9d752b126b2c5ccae72296450c5ac6d552475180a995fb476c96b4ed443f9f5fc3a4e85536180eecb22ed87b45adee547c6ca

  • memory/1300-10-0x0000000000EA0000-0x0000000000EB2000-memory.dmp

    Filesize

    72KB

  • memory/1300-9-0x0000000073B2E000-0x0000000073B2F000-memory.dmp

    Filesize

    4KB

  • memory/1300-13-0x0000000073B20000-0x000000007420E000-memory.dmp

    Filesize

    6.9MB

  • memory/1300-14-0x0000000073B20000-0x000000007420E000-memory.dmp

    Filesize

    6.9MB

  • memory/2148-0-0x000000007421E000-0x000000007421F000-memory.dmp

    Filesize

    4KB

  • memory/2148-1-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB