Analysis

  • max time kernel
    111s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 11:42

General

  • Target

    7210d097545b7af6dc4adea8fc75ab90N.exe

  • Size

    46KB

  • MD5

    7210d097545b7af6dc4adea8fc75ab90

  • SHA1

    2479c7b50db9792d0600bde650cf4ce1a575e84b

  • SHA256

    dd835fb664296585ce773c1cb62d136a391fb42a09fb22bc3a0bfb365613c47d

  • SHA512

    de641c50263a315fbd1b67d213e4b242d28964dec22dbc9539df774828f69740b4660bc75ed58a0066ae31b26fde51127725617373545263570a56bca3243ff5

  • SSDEEP

    768:3dhO/poiiUcjlJInXbSH9Xqk5nWEZ5SbTDaJuI7CPW51:tw+jjgnXOH9XqcnW85SbT0uId

Malware Config

Extracted

Family

xenorat

C2

rzelip-20809.portmap.host

Mutex

rhxdjsrdhfkydfkydftgd

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    41645

  • startup_name

    nothingset

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7210d097545b7af6dc4adea8fc75ab90N.exe
    "C:\Users\Admin\AppData\Local\Temp\7210d097545b7af6dc4adea8fc75ab90N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1976-0-0x0000000074CCE000-0x0000000074CCF000-memory.dmp

    Filesize

    4KB

  • memory/1976-1-0x00000000011F0000-0x0000000001202000-memory.dmp

    Filesize

    72KB

  • memory/1976-2-0x0000000074CC0000-0x00000000753AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1976-3-0x0000000074CC0000-0x00000000753AE000-memory.dmp

    Filesize

    6.9MB