Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-08-2024 23:31

General

  • Target

    Downlaoder_Menu.exe

  • Size

    4.5MB

  • MD5

    ec79983fdb605310fac832ba5809e2d6

  • SHA1

    ca83d6453563e02decf614d0ce331de493267d2f

  • SHA256

    b67d8fc52334fb2309368bf2a738520f1b42436951b211b7896f612b86350c10

  • SHA512

    234bb8696c8a6929784165366dc4317d5826738711a7661bf26e4ffab8e958db23d0f2a11542b3f0b5c4c71d62d3e4bc7a730d94d917a21d132d40e2a67ed460

  • SSDEEP

    98304:ePj50PrsilC2IbhblAh5+dWspirADIsYAVjw1gI:i5gahZWs80sfsw1R

Malware Config

Extracted

Family

xenorat

C2

hax.onthewifi.com

Mutex

hAxxx

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    1960

  • startup_name

    Windows

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 4 TTPs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Power Settings 1 TTPs 4 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Downlaoder_Menu.exe
    "C:\Users\Admin\AppData\Local\Temp\Downlaoder_Menu.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHoAawByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAbABwACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAcABwACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAZgBnACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2332
    • C:\Windows\Downloader_Menu_2.1.exe
      "C:\Windows\Downloader_Menu_2.1.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5732
      • C:\Users\Admin\cvtres.exe
        C:\Users\Admin\cvtres.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4056
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\temp_.ps1"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops startup file
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:864
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
            5⤵
            • Drops file in Drivers directory
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5272
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1948
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:5380
              • C:\Windows\system32\wusa.exe
                wusa /uninstall /kb:890830 /quiet /norestart
                7⤵
                  PID:3328
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop UsoSvc
                6⤵
                • Launches sc.exe
                PID:4752
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop WaaSMedicSvc
                6⤵
                • Launches sc.exe
                PID:5156
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop wuauserv
                6⤵
                • Launches sc.exe
                PID:480
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop bits
                6⤵
                • Launches sc.exe
                PID:2036
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop dosvc
                6⤵
                • Launches sc.exe
                PID:1772
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:6120
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:6116
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:6104
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:6096
              • C:\Windows\explorer.exe
                explorer.exe
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4168
      • C:\Users\Admin\AppData\Roaming\risk.exe
        "C:\Users\Admin\AppData\Roaming\risk.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5224
        • C:\Users\Admin\AppData\Roaming\XenoManager\risk.exe
          "C:\Users\Admin\AppData\Roaming\XenoManager\risk.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks.exe" /Create /TN "Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBE00.tmp" /F
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2516
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3448
      • C:\Windows\System32\oobe\UserOOBEBroker.exe
        C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
        1⤵
        • Drops file in Windows directory
        PID:2028
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
        C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
        1⤵
        • System Location Discovery: System Language Discovery
        PID:5408
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
        1⤵
          PID:340

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          658f3bf78584ea9c1f07bd757ac40458

          SHA1

          7ef82e5fe0f022e7947d4c415989d022600b85a8

          SHA256

          38d02db2af94bc460d7cccbd261dd830744a4546a29a9ac798fb61f2297e9df8

          SHA512

          c5068b954c15c5861c0d58b82d129d7be8da6479a9b8886295cf67eae2aec0d08f71a67783462c93ef70d09d9fc71f9e4112cb57056ae1c6b936f2c7c5205179

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          c99a3482a8a02266c151f4871d26f7b8

          SHA1

          3e29577df0aa39dd71435d64187d79889de752c6

          SHA256

          db0b13e6d8f9513168e629a19b647b71fc836028935e4423792698e98e6879a8

          SHA512

          fe29e5dc317da5c1efdbcef061119172b4108601db320c92a2132e0c83cfbaf604ccf9c390af82842b97f84d0bac934d80f052a84b3a7a93927b4b48152fde5a

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0u0fn1s4.oit.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\tmpBE00.tmp

          Filesize

          1KB

          MD5

          c824a7486b8af655d347fd367022d0d2

          SHA1

          17bb7f077818e6d5ecb3be0fc681d341b82dd72b

          SHA256

          025ef7965c1b7643ff8d71a48c71d62ce4380e3ac6324ecf51f80717a4d61c14

          SHA512

          a026982ac700263bf2dfd5415365dbe52b0e59095adfd00c937af28f5c84978faf65aeb2cd2c7c9dc5c7b38dc82dc2acc2d7b91e96026e73a881483168586bc1

        • C:\Users\Admin\AppData\Roaming\risk.exe

          Filesize

          45KB

          MD5

          2cb05f0d4360327b33956fedf516c6fe

          SHA1

          4562653b1361ce66ded9633e5883d00184c08796

          SHA256

          af82f7a1ca358d54f5da73409d05360c265f7569fb768218051c7ef2620e66e6

          SHA512

          f0967245d1693d74d146356c9540a9ae0b848a96a6e58eacc111a951a6b32e01f325f8848b2b0c66b38dbfcdcb37e052ccfc27cf9b3b6752f3cba876181f6fa6

        • C:\Users\Admin\cvtres.exe

          Filesize

          5KB

          MD5

          c9698a20e68954387eed40d36d17c087

          SHA1

          c50cf0ac1cbf51a89b6c1b816e5e63e7e7287179

          SHA256

          3a71a978827979baeec7b94607e93a72cf2a51a7204a572f68a3788d83b87d8f

          SHA512

          f8099e4e6bf6e1cd850faa398b3ef8862852342bef0ec8a7318495be6e82ddf903834b951faa6c5bbd0879414dcaccf3fec6ade4ef74054e08011d718ed1e813

        • C:\Users\Admin\temp.bat

          Filesize

          5.4MB

          MD5

          96b7afe999094957a1ce5b1c0ee0cb2f

          SHA1

          6b5d48b5f75246993de0263d27d2b9cdcc6ebf3f

          SHA256

          d22cb88bfae5285d86cb35c2acba863f85b2e63c241c1959d15ca3416bcb5e4a

          SHA512

          ed7e02b26664b442f95fdf83af03d7773c017dadf3bec8c2d37cc2b30c49b6751a3104b85f00cfedbd145f422635e5b3ad49ea80adf7c0a92b06db474c6a238c

        • C:\Users\Admin\temp.ps1

          Filesize

          1KB

          MD5

          5e817bbd9ef2f8821aa0283b20a51923

          SHA1

          102ca518d89653fb400636e660fa3fc276235c5c

          SHA256

          27f2822ca2be992ebb6e1000aa3a2c39e9b4ff7e257cb45eadda8776d65018a7

          SHA512

          f21388e0655e6733abc70ff9fe2bbfdca00d81d2e7a09236d679293df34a966990f689f2d62119cdd877c7aeda35ab0c2b3c66108bc6b721e5dea34a93342d2e

        • C:\Users\Admin\temp_.bat

          Filesize

          5.4MB

          MD5

          ff46d6b0970c55dba491b6dd06384f84

          SHA1

          c8be08575f2174a9a00bff33e3b1a7c1d9c4a025

          SHA256

          a5ad5faab69350449e8fd14adcb262ecb289696d5f0da374891e9eb226824c85

          SHA512

          b0d5b4eb5d9b58f35f218dffb43956716adb062626a75fcde11ba517e9d16d015f8a0d90ae72fbad47c87cbec86ef3e6a16347900f0c0be97e47f6d58bdac3a6

        • C:\Users\Admin\temp_.ps1

          Filesize

          1KB

          MD5

          5a0a8376c0e45cc25d4050920cee3dcc

          SHA1

          2de4ddf90f3165b245bd9f77c145c8f770c98b85

          SHA256

          86af1b7845145745ccaf65bf0dbeb1a981701ad0c6793c2dc93c0c2f2aef8d25

          SHA512

          f5afd39336d6b9f0590d68a716e8c3b403c13b98aae34d76f43e34698d2c6485e3dbce7a6439623362effec50ab0b2696b1ed25e377ba4dae75047ef419f51c0

        • C:\Windows\Downloader_Menu_2.1.exe

          Filesize

          4.4MB

          MD5

          9d3195f106a540570da0d038bc07cf68

          SHA1

          33c1dd7a4101d1622b4d9268da0b731e00ddca39

          SHA256

          240b3b43f49f5430d9d2e263e857d6e4c9c98af09fe8ae7d9c0e6b7c9eeacfce

          SHA512

          9c7b0da3e2a01a05f61e39648d31851c5b0d70d7f20d865792cf4c8cec39ad764b2f11833116dbcdea57f3ec1785345921defbd656eab4fc23095b63ba889f69

        • memory/864-112-0x000001EA3B340000-0x000001EA3B870000-memory.dmp

          Filesize

          5.2MB

        • memory/864-114-0x000001EA22E50000-0x000001EA22E6E000-memory.dmp

          Filesize

          120KB

        • memory/864-116-0x000001EA22740000-0x000001EA22746000-memory.dmp

          Filesize

          24KB

        • memory/864-99-0x000001EA22D90000-0x000001EA22DB2000-memory.dmp

          Filesize

          136KB

        • memory/864-113-0x000001EA2B0E0000-0x000001EA2B156000-memory.dmp

          Filesize

          472KB

        • memory/2268-74-0x0000000007620000-0x0000000007C9A000-memory.dmp

          Filesize

          6.5MB

        • memory/2268-30-0x00000000058E0000-0x0000000005946000-memory.dmp

          Filesize

          408KB

        • memory/2268-31-0x0000000005B80000-0x0000000005ED7000-memory.dmp

          Filesize

          3.3MB

        • memory/2268-75-0x0000000006490000-0x00000000064AA000-memory.dmp

          Filesize

          104KB

        • memory/2268-78-0x0000000008250000-0x00000000087F6000-memory.dmp

          Filesize

          5.6MB

        • memory/2268-27-0x0000000005240000-0x000000000586A000-memory.dmp

          Filesize

          6.2MB

        • memory/2268-80-0x0000000007190000-0x0000000007222000-memory.dmp

          Filesize

          584KB

        • memory/2268-29-0x0000000005870000-0x00000000058D6000-memory.dmp

          Filesize

          408KB

        • memory/2268-11-0x000000007352E000-0x000000007352F000-memory.dmp

          Filesize

          4KB

        • memory/2332-62-0x0000000074540000-0x000000007458C000-memory.dmp

          Filesize

          304KB

        • memory/2332-79-0x0000000007110000-0x000000000711A000-memory.dmp

          Filesize

          40KB

        • memory/2332-85-0x00000000073D0000-0x00000000073EA000-memory.dmp

          Filesize

          104KB

        • memory/2332-86-0x00000000073C0000-0x00000000073C8000-memory.dmp

          Filesize

          32KB

        • memory/2332-83-0x00000000072D0000-0x00000000072DE000-memory.dmp

          Filesize

          56KB

        • memory/2332-93-0x0000000073520000-0x0000000073CD1000-memory.dmp

          Filesize

          7.7MB

        • memory/2332-82-0x0000000007290000-0x00000000072A1000-memory.dmp

          Filesize

          68KB

        • memory/2332-84-0x00000000072E0000-0x00000000072F5000-memory.dmp

          Filesize

          84KB

        • memory/2332-81-0x0000000007310000-0x00000000073A6000-memory.dmp

          Filesize

          600KB

        • memory/2332-23-0x0000000004890000-0x00000000048C6000-memory.dmp

          Filesize

          216KB

        • memory/2332-73-0x0000000006F40000-0x0000000006FE4000-memory.dmp

          Filesize

          656KB

        • memory/2332-72-0x0000000006320000-0x000000000633E000-memory.dmp

          Filesize

          120KB

        • memory/2332-61-0x0000000006CF0000-0x0000000006D24000-memory.dmp

          Filesize

          208KB

        • memory/2332-60-0x0000000005D60000-0x0000000005DAC000-memory.dmp

          Filesize

          304KB

        • memory/2332-59-0x0000000005D30000-0x0000000005D4E000-memory.dmp

          Filesize

          120KB

        • memory/2332-28-0x0000000004F90000-0x0000000004FB2000-memory.dmp

          Filesize

          136KB

        • memory/2332-25-0x0000000073520000-0x0000000073CD1000-memory.dmp

          Filesize

          7.7MB

        • memory/4056-91-0x000001F0A9950000-0x000001F0A9958000-memory.dmp

          Filesize

          32KB

        • memory/4168-145-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-142-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-151-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-134-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-141-0x00000000004E0000-0x0000000000500000-memory.dmp

          Filesize

          128KB

        • memory/4168-140-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-138-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-137-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-143-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-152-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-150-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-146-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-144-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-139-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-135-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-136-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/4168-147-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/5224-22-0x0000000000730000-0x0000000000742000-memory.dmp

          Filesize

          72KB

        • memory/5272-118-0x0000000140000000-0x0000000140508000-memory.dmp

          Filesize

          5.0MB

        • memory/5272-117-0x0000000140000000-0x0000000140508000-memory.dmp

          Filesize

          5.0MB