Analysis
-
max time kernel
60s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
XenoRAT.exe
Resource
win7-20240705-en
General
-
Target
XenoRAT.exe
-
Size
150KB
-
MD5
fcc55ef512ccf37a07ec703b59cc7aad
-
SHA1
9abef70ff67a2a7032ac1da4cd65424e7b2130b7
-
SHA256
38b26e2364bc081a90145838451341f14bda3cbd15bba54bf0114cab5d2f8667
-
SHA512
e26567479340c42126937edba18399af1d070b89c95fb8871dcbf3afb524bc89e289d361f4aa038f655e77b28e095ae3e487d8938248ea3d32677168acd17517
-
SSDEEP
3072:1QeAu96QNvQRARkML2zzFT1xfeRfAqq9a7JcKYfb5q9ZX4o3+mI:v9zvQvMLqFT1JZ9a7NYfbkT93fI
Malware Config
Extracted
xenorat
45.66.231.63
Holid_rat_nd8859g
-
delay
60400
-
install_path
appdata
-
port
1243
-
startup_name
HDdisplay
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2324 XenoRAT.exe 2204 XenoRAT.exe 2404 XenoRAT.exe 2040 XenoRAT.exe 2688 XenoRAT.exe -
Loads dropped DLL 5 IoCs
pid Process 772 XenoRAT.exe 2324 XenoRAT.exe 2324 XenoRAT.exe 2324 XenoRAT.exe 2324 XenoRAT.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2548 set thread context of 772 2548 XenoRAT.exe 31 PID 2548 set thread context of 2244 2548 XenoRAT.exe 32 PID 2548 set thread context of 2276 2548 XenoRAT.exe 33 PID 2548 set thread context of 2228 2548 XenoRAT.exe 34 PID 2324 set thread context of 2204 2324 XenoRAT.exe 36 PID 2324 set thread context of 2404 2324 XenoRAT.exe 37 PID 2324 set thread context of 2040 2324 XenoRAT.exe 38 PID 2324 set thread context of 2688 2324 XenoRAT.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoRAT.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1988 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2548 XenoRAT.exe Token: SeDebugPrivilege 2324 XenoRAT.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 772 2548 XenoRAT.exe 31 PID 2548 wrote to memory of 772 2548 XenoRAT.exe 31 PID 2548 wrote to memory of 772 2548 XenoRAT.exe 31 PID 2548 wrote to memory of 772 2548 XenoRAT.exe 31 PID 2548 wrote to memory of 772 2548 XenoRAT.exe 31 PID 2548 wrote to memory of 772 2548 XenoRAT.exe 31 PID 2548 wrote to memory of 772 2548 XenoRAT.exe 31 PID 2548 wrote to memory of 772 2548 XenoRAT.exe 31 PID 2548 wrote to memory of 772 2548 XenoRAT.exe 31 PID 2548 wrote to memory of 2244 2548 XenoRAT.exe 32 PID 2548 wrote to memory of 2244 2548 XenoRAT.exe 32 PID 2548 wrote to memory of 2244 2548 XenoRAT.exe 32 PID 2548 wrote to memory of 2244 2548 XenoRAT.exe 32 PID 2548 wrote to memory of 2244 2548 XenoRAT.exe 32 PID 2548 wrote to memory of 2244 2548 XenoRAT.exe 32 PID 2548 wrote to memory of 2244 2548 XenoRAT.exe 32 PID 2548 wrote to memory of 2244 2548 XenoRAT.exe 32 PID 2548 wrote to memory of 2244 2548 XenoRAT.exe 32 PID 2548 wrote to memory of 2276 2548 XenoRAT.exe 33 PID 2548 wrote to memory of 2276 2548 XenoRAT.exe 33 PID 2548 wrote to memory of 2276 2548 XenoRAT.exe 33 PID 2548 wrote to memory of 2276 2548 XenoRAT.exe 33 PID 2548 wrote to memory of 2276 2548 XenoRAT.exe 33 PID 2548 wrote to memory of 2276 2548 XenoRAT.exe 33 PID 2548 wrote to memory of 2276 2548 XenoRAT.exe 33 PID 2548 wrote to memory of 2276 2548 XenoRAT.exe 33 PID 2548 wrote to memory of 2276 2548 XenoRAT.exe 33 PID 2548 wrote to memory of 2228 2548 XenoRAT.exe 34 PID 2548 wrote to memory of 2228 2548 XenoRAT.exe 34 PID 2548 wrote to memory of 2228 2548 XenoRAT.exe 34 PID 2548 wrote to memory of 2228 2548 XenoRAT.exe 34 PID 2548 wrote to memory of 2228 2548 XenoRAT.exe 34 PID 2548 wrote to memory of 2228 2548 XenoRAT.exe 34 PID 2548 wrote to memory of 2228 2548 XenoRAT.exe 34 PID 2548 wrote to memory of 2228 2548 XenoRAT.exe 34 PID 2548 wrote to memory of 2228 2548 XenoRAT.exe 34 PID 772 wrote to memory of 2324 772 XenoRAT.exe 35 PID 772 wrote to memory of 2324 772 XenoRAT.exe 35 PID 772 wrote to memory of 2324 772 XenoRAT.exe 35 PID 772 wrote to memory of 2324 772 XenoRAT.exe 35 PID 2324 wrote to memory of 2204 2324 XenoRAT.exe 36 PID 2324 wrote to memory of 2204 2324 XenoRAT.exe 36 PID 2324 wrote to memory of 2204 2324 XenoRAT.exe 36 PID 2324 wrote to memory of 2204 2324 XenoRAT.exe 36 PID 2324 wrote to memory of 2204 2324 XenoRAT.exe 36 PID 2324 wrote to memory of 2204 2324 XenoRAT.exe 36 PID 2324 wrote to memory of 2204 2324 XenoRAT.exe 36 PID 2324 wrote to memory of 2204 2324 XenoRAT.exe 36 PID 2324 wrote to memory of 2204 2324 XenoRAT.exe 36 PID 2324 wrote to memory of 2404 2324 XenoRAT.exe 37 PID 2324 wrote to memory of 2404 2324 XenoRAT.exe 37 PID 2324 wrote to memory of 2404 2324 XenoRAT.exe 37 PID 2324 wrote to memory of 2404 2324 XenoRAT.exe 37 PID 2324 wrote to memory of 2404 2324 XenoRAT.exe 37 PID 2324 wrote to memory of 2404 2324 XenoRAT.exe 37 PID 2324 wrote to memory of 2404 2324 XenoRAT.exe 37 PID 2324 wrote to memory of 2404 2324 XenoRAT.exe 37 PID 2324 wrote to memory of 2404 2324 XenoRAT.exe 37 PID 2324 wrote to memory of 2040 2324 XenoRAT.exe 38 PID 2324 wrote to memory of 2040 2324 XenoRAT.exe 38 PID 2324 wrote to memory of 2040 2324 XenoRAT.exe 38 PID 2324 wrote to memory of 2040 2324 XenoRAT.exe 38 PID 2324 wrote to memory of 2040 2324 XenoRAT.exe 38 PID 2324 wrote to memory of 2040 2324 XenoRAT.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\XenoRAT.exe"C:\Users\Admin\AppData\Local\Temp\XenoRAT.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\XenoRAT.exeC:\Users\Admin\AppData\Local\Temp\XenoRAT.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exe"C:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exeC:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exeC:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exeC:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exeC:\Users\Admin\AppData\Roaming\XenoManager\XenoRAT.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\XenoRAT.exeC:\Users\Admin\AppData\Local\Temp\XenoRAT.exe2⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\XenoRAT.exeC:\Users\Admin\AppData\Local\Temp\XenoRAT.exe2⤵
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB6F0.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1988
-
-
-
C:\Users\Admin\AppData\Local\Temp\XenoRAT.exeC:\Users\Admin\AppData\Local\Temp\XenoRAT.exe2⤵
- System Location Discovery: System Language Discovery
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5961e7ac8e35d0656a62385c11fca1647
SHA139bcac6fb9481661123ff220d3a4d0cdd6f16c81
SHA256bca1401eabb71a5ca39dc4626ee257430d340e9333626ad47f6a8cd68c49a046
SHA5125206a2c52ba0a81d082a3e08cc38a4882be70dc5e508e04136b315033275f4b296b343187c7f9b1a824058406306b9b7a55432fc518d83ba452fd7094b953258
-
Filesize
150KB
MD5fcc55ef512ccf37a07ec703b59cc7aad
SHA19abef70ff67a2a7032ac1da4cd65424e7b2130b7
SHA25638b26e2364bc081a90145838451341f14bda3cbd15bba54bf0114cab5d2f8667
SHA512e26567479340c42126937edba18399af1d070b89c95fb8871dcbf3afb524bc89e289d361f4aa038f655e77b28e095ae3e487d8938248ea3d32677168acd17517