Resubmissions
24-07-2024 00:10
240724-af2xgszdrh 1024-07-2024 00:07
240724-aeqstswfnp 1024-07-2024 00:03
240724-acj79szcna 10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 00:10
Behavioral task
behavioral1
Sample
xeno rat client.exe
Resource
win7-20240705-en
General
-
Target
xeno rat client.exe
-
Size
46KB
-
MD5
d23d8120af87a615a456a12b43d4a98a
-
SHA1
73b41123d6f50aecdcf1c5e87a7d0319d753b0e7
-
SHA256
27178a08e0d8fb6e5e31ae9bff6194a5224406666fa1f528d4719c1e4a8efd67
-
SHA512
99026704fef97f9f9c01348310f199ad523851e105c7ea1f39312c7370cb6e50af5044fec1041298b96b6e661ac5f48d6af80687e21364806e62738d198ad319
-
SSDEEP
768:Ddqf04XKojwYybbZWsiBHUuOkU7cK9F9km3XNZ5SbTDay6t22:D4z0z3ZWsiBHUuY79kmz5SbTL6B
Malware Config
Extracted
xenorat
localhost
testing 123123
-
delay
1000
-
install_path
nothingset
-
port
1234
-
startup_name
nothingset
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 110 raw.githubusercontent.com 111 raw.githubusercontent.com -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno rat client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno rat client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno rat client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno rat server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno rat client.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3419463127-3903270268-2580331543-1000\{9B0698ED-1A44-452A-B7D3-99EFA2E38DBE} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 2332 msedge.exe 2332 msedge.exe 2972 identity_helper.exe 2972 identity_helper.exe 2420 msedge.exe 2420 msedge.exe 1384 msedge.exe 1384 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2000 xeno rat server.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 4892 2332 msedge.exe 95 PID 2332 wrote to memory of 4892 2332 msedge.exe 95 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4288 2332 msedge.exe 96 PID 2332 wrote to memory of 4868 2332 msedge.exe 97 PID 2332 wrote to memory of 4868 2332 msedge.exe 97 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98 PID 2332 wrote to memory of 2276 2332 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\xeno rat client.exe"C:\Users\Admin\AppData\Local\Temp\xeno rat client.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RestartConnect.mht1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffc451a46f8,0x7ffc451a4708,0x7ffc451a47182⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3308 /prefetch:82⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:5660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,10421132134690257325,8112781674941817088,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5248
-
C:\Users\Admin\Downloads\Release\stub\xeno rat client.exe"C:\Users\Admin\Downloads\Release\stub\xeno rat client.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5564
-
C:\Users\Admin\Downloads\Release\stub\xeno rat client.exe"C:\Users\Admin\Downloads\Release\stub\xeno rat client.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2784
-
C:\Users\Admin\Downloads\Release\xeno rat server.exe"C:\Users\Admin\Downloads\Release\xeno rat server.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2000
-
C:\Users\Admin\Downloads\Release\stub\xeno rat client.exe"C:\Users\Admin\Downloads\Release\stub\xeno rat client.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD58d603c84bb9f70ff285274dbfdffa780
SHA194b6ba00a4fda41f40d84a86b1e512ed437b73ed
SHA2565b4af040811a30d7d410422195b9298db764b49f13796f32d9a1ee0dd16705d4
SHA51266323da7a2a4c06873906259fe66999f4e87e356f431564f939bddedd17faefeb38bd60e1b8af460f0303a2144b3cec53ae6368fa00be7a45089e47534f9b43a
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\974b2a80-4b79-4005-9ed4-7e49e8ebb63e.tmp
Filesize5KB
MD5107f4b53bf94e3f99f975d480982427b
SHA1fd33482cbfc037af46bfc4ea181d1a3d28397a0d
SHA256b6f8a4fb9f4a6c674b25fc76ba7348c7dae06650c88e2d4d15ea848008416c02
SHA5120b300d8155c149da39069a4051a949fab57b1617f96fe6ef9397c7262732ecf640d13059395168b3ba2836c2141d93d0a0542409e75574524d769f69999fde0c
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
67KB
MD51d9097f6fd8365c7ed19f621246587eb
SHA1937676f80fd908adc63adb3deb7d0bf4b64ad30e
SHA256a9dc0d556e1592de2aeef8eed47d099481cfb7f37ea3bf1736df764704f39ddf
SHA512251bf8a2baf71cde89873b26ee77fe89586daf2a2a913bd8383b1b4eca391fdd28aea6396de3fdff029c6d188bf9bb5f169954e5445da2933664e70acd79f4e3
-
Filesize
41KB
MD591be4e2bf6957e5b01200b15f83b9af1
SHA1cb9b994eb27a6e41885e4b3dedc78fa1ea9324a9
SHA2569951e1f58567cad50199fa9e5a1b380e3f0784da276fb2d5f859110d5832dd93
SHA512c633e932eae25c5858ac035be15f99d273183306bdc1e296e9f0154219ec2da76126158c4a2e5f2af2d27473f6077f03f518d2edd0f1981f321079953f876c5c
-
Filesize
63KB
MD5710d7637cc7e21b62fd3efe6aba1fd27
SHA18645d6b137064c7b38e10c736724e17787db6cf3
SHA256c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b
SHA51219aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
1.2MB
MD5931d16be2adb03f2d5df4d249405d6e6
SHA17b7076fb55367b6c0b34667b54540aa722e2f55f
SHA256b6aa0f7290e59637a70586303507208aca637b63f77b5ce1795dfe9b6a248ff3
SHA51241d44eafc7ade079fc52553bc792dace0c3ed6ee0c30430b876b159868010b8676c5302790d49bed75fa7daa158d4285e236a4be3d13f51ff244c68ca6a479ad
-
Filesize
43KB
MD5209af4da7e0c3b2a6471a968ba1fc992
SHA12240c2da3eba4f30b0c3ef2205ce7848ecff9e3f
SHA256ecc145203f1c562cae7b733a807e9333c51d75726905a3af898154f3cefc9403
SHA51209201e377e80a3d03616ff394d836c85712f39b65a3138924d62a1f3ede3eac192f1345761c012b0045393c501d48b5a774aeda7ab5d687e1d7971440dc1fc35
-
Filesize
73KB
MD5cf604c923aae437f0acb62820b25d0fd
SHA184db753fe8494a397246ccd18b3bb47a6830bc98
SHA256e2b4325bb9a706cbfba8f39cca5bde9dae935cbb1d6c8a562c62e740f2208ab4
SHA512754219b05f2d81d11f0b54e5c7dd687bd82aa59a357a3074bca60fefd3a88102577db8ae60a11eb25cc9538af1da39d25fa6f38997bdc8184924d0c5920e89c8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD53b5e4121e7c68cdfcaa418d75a8344ed
SHA1b9a737946b5871a3ecc12fc9f5a86da1baf01802
SHA25600fdb36962f84578e6ca1a7dfb30d93c9cd2f89933b08978fce7db4494aa5e3a
SHA512ddef3ac820e501ca121fda3ac3192b286b69c19dd2a067d8735da60edd8ceb6f3554bbbda41787283b70caf4fc5c223741c2a2a3578e907b87393c6477f90a3c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5342767de04bb2e9da87340d3411de502
SHA1e8052c9f4665b72a4cc030c9b0ee08b968c0120f
SHA25669afcb4211883806bcd61feef2cf3b4b37f4ded936aade4e4e1170979c76a065
SHA512f4b35bc14d02a3b162dedd885e5aa3cf0363bb9fa3bbf7590ab99d787f5d697e74c202003aec815a5543b7ade48389f9af67a3936583211021bec7ebb9708493
-
Filesize
709B
MD5d0f1eaf157272356a5c4e2e7471a4a54
SHA173e477209b9b9248b4f1f064f16d6ac0b124b38f
SHA256b0fee6d315fea518a0cefad93bf4ddcbff64467bfe06fad438701bddd12f8ed3
SHA512f7b3a3b4316825b01f7863202b88dee1b3a98670fc340dae258d81d9091d6499938b06c6fbf432606db0922eed38d1200e63bcacb4be369f25c1bb51d25413e6
-
Filesize
1KB
MD535a2d88d922efa3ae1a9a37e6bd81947
SHA1fd704f77d505636e0ef54d190b73c10bf3243e34
SHA256e58b72f2c19c655c2cdfd156eb35969d2b694f85ebf2283875fa81d3db6defc0
SHA5128699b48ea7b71bfd55f4b187374e527cb85926b806f5417fca934bc617b4902aed9b42d7aed0e2cb7f4f7d53a6b2bb64c9199366337e0bf6993d3a04c9975008
-
Filesize
6KB
MD540fea686e6afb37355005d4eb227b1dc
SHA1fe4d50da09f6bf42c6a4c4a7abba6f1683de9b90
SHA256f45e614120e0b684a52483ef8c8669238253610608e601950b80b7c5d5887877
SHA5124533718f2b11da7e11bc41187c118eae61f468f4e37837ef0c25172229acd6a38ce879eaa18c076cf0ec400c4ecdfbaeee2ea7c2bbade6bb10989292dcf1f0ed
-
Filesize
6KB
MD5aa7b1623075dd6e7042a9dc76a8a4c0d
SHA1413f49087d162335c5a4f5417f855ddc940d44aa
SHA256a2eedd8d3903dc34fc408bb2f835085726943918236240d37e6a9b7f6954a0fe
SHA51277c080fb959c0f359891d93e1acf2e4b04f6b956204336de6487fc601522da20b804cff1b7fad224a01c65085e6090d42994f88b15fea5891a3f82fabcf609d3
-
Filesize
7KB
MD504f97b7cb9cb0794502c712a48d7da0b
SHA1502214d5986247dff3ea2feed96936afcf44206f
SHA25622939aea2696fa24ee01c5bf0537003c7b4f9f2534808f182d19cf9989dbb1d9
SHA5122aea1915b1892e0e05820190c9e806fab1a2083184e0780dbbd06e016a5dbf319e7cec8758e501605b88db9f4b1213f4abfcd35d7dc73d79057aaef8b499be3c
-
Filesize
6KB
MD5f473df4220b1e9b85d660e78a0d84240
SHA1d6b15099eb10d3f1861893be4a7d5045c0339443
SHA256db9ad80417209620fb764c1d5e8330386cfa1083715e5321be2a8ed69efa4097
SHA5121d1f494fb2bb1963db30f934bee26b0b39f508b3ec15e3c0a76cc2def39f60e1787bd02cead6b8083c51e890ef338619dd172077bb8181523cfbeed6f6605177
-
Filesize
7KB
MD557b9e80176452bc21b297a488bd0707d
SHA1e8ed0c585941ca202e038c5c0558c5056304f8f2
SHA25672dd96f4a35c396b27ee15ce96df806c24e9341ef5657dbcfbc9b59a75a7a3d5
SHA512f21ea37d6fb2b28eda16b78e258ce21c4d49b3fefb5b0e83809ae2865330895fc58da127c7364d4d84b847137dd896e804cffdead08f2800c5b6bbc9f723a2c8
-
Filesize
538B
MD5e59f8cb839922b4242a41839b0f914a8
SHA19c10123157df0811bbba3ecd3786742e256ace9b
SHA256fe59525647cd3cf6217ce3661ce59fafd269ac3fc5b7dfe509dc2824fc235022
SHA512208235d72345a33b65267385a5b81d0dc2c6915cc75313023ffe9a565c3c00ae62b9a21e41d16be52e4e3524db375944f5d3ac683a882210e73505706a2dd765
-
Filesize
1KB
MD53ffa3bf19f42c4561b9d74ffe1c6ac18
SHA13813ddd82084391bf4912bec60ef99f573152073
SHA256742db0486595fa1baf6d581fb607f5b6cee48b1dadc9fd6eb54f4f9784a32c56
SHA5124dfbd7e2c1eff8982051dfe07a560f108aa6a23c3cf0f2dbd5a7684b080b5f68ea92350e5b3cb18b31bb51fcd4c2535f54fd088b02defd471ef3f3d42790501b
-
Filesize
1KB
MD5bdd3575065ba75f42ff3320e3947156b
SHA1d6f1761ad227740dcbb544bc0fea8ff81e843767
SHA25647fe57a62c327142d556b56755bec0b60324718667421985c5e2f615d49845c5
SHA5122456691e7b04e34524b072f80281aed615e3411483baa54c688fa41d941fd34549f74a0aa7bbaae3df4216472e51155ff4598cd502b75a0ceafd4f5a97d94780
-
Filesize
538B
MD5843c6156ef35b03dfd17a169dd2c39df
SHA193f32da64e4d120c710ab88effc8d83e16d96024
SHA256a565e5bc8f7ce0b43c67dc418927b6f8f02d70e649fdf197b8ad1a24fecfe628
SHA512a7d60f0bc6b6551ae9884bb6c74df40af1fcc310d64ba06f513312cf1d6cf11c1001dd5dc1e7723b57419045bd9be7a1344ced72891561f50502e40e7568b4da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57fea72a57c5eaf355e9291080720da6b
SHA1e7f8cc6f2c110d250ea3f13a907c3a96f8a7669c
SHA256dee3e15a6b27cea0d3712e295e2455450e053b885262903acab653093565b932
SHA5129fe181cc62ac936bf06d2f9c4cb0ecb960dfc52c4ecd6a8a11d9e7696b686538d7bf42e55b536adf1c777b95c3edbe1af761969e39f411d7fd79d3c29fab8e6f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD518b34881daf181cf38fb46690437a6fe
SHA1f714e223e4ba4e7631a9678c93e5238491e0d5d2
SHA2567dbb324299d071348cfd5613e76a537ed0a2abbc7e9c30899e2d976dbd76ce9b
SHA512fcd87cacb78eea6a9f73d906178d98124973fc3b1ad610ba7a1df4e694ed457205777237f18306a8dc83d2a79ca23afbdd47c7e2b06eb83b33e62d0eb91c57b6
-
Filesize
6.4MB
MD589661a9ff6de529497fec56a112bf75e
SHA12dd31a19489f4d7c562b647f69117e31b894b5c3
SHA256e7b275d70655db9cb43fa606bbe2e4f22478ca4962bbf9f299d66eda567d63cd
SHA51233c765bf85fbec0e58924ece948b80a7d73b7577557eaac8865e481c61ad6b71f8b5b846026103239b3bd21f438ff0d7c1430a51a4a149f16a215faad6dab68f