Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    04-08-2024 00:53

General

  • Target

    961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe

  • Size

    2.4MB

  • MD5

    19f800a3a545e1b561f2252b5c0e0e67

  • SHA1

    67ac88d73c24ab0b7f5224d6544bab466d3cfdbd

  • SHA256

    961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711

  • SHA512

    fb5c0287288ac310380925a9e71dd95df6b681b8c47e782f9747d20ced82d0501db58c5626df93d8c6601363dc7fa25906128a567a6ef5ef404bce5ca394921b

  • SSDEEP

    49152:lU9LXFXogd7j9ja4byzZwDNvuVxvxNlzQjxkdCv0FYtaPyZ9yLVJoWriNIZF5:lUV5HjOwGxJN+jxkdKbtaPYyLVJoY

Malware Config

Extracted

Family

xenorat

C2

178.214.236.32

Mutex

Хост-процесс для задач Windows

Attributes
  • delay

    500

  • install_path

    temp

  • port

    3450

  • startup_name

    Хост-процесс для задач Windows

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe
    "C:\Users\Admin\AppData\Local\Temp\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Users\Admin\AppData\Local\Temp\XenoManager\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe
      "C:\Users\Admin\AppData\Local\Temp\XenoManager\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "Хост-процесс для задач Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB413.tmp" /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpB413.tmp

    Filesize

    1KB

    MD5

    e6c9b2554967d71e1d716a732791d83c

    SHA1

    d723c3e6db122b5d11fa7b981b4d00788238afb2

    SHA256

    7839dd13711e91ed0cbe9a2b7fac3b89ed82931a0c82ab95d68c021c448a4176

    SHA512

    6975087fef8cc03691491bde88d2d7194a542594d7c3438276c82da292e2407e232de2c26998cc0b16e88fcf799979e293024dd19837389587403b95a5940606

  • \Users\Admin\AppData\Local\Temp\XenoManager\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe

    Filesize

    2.4MB

    MD5

    19f800a3a545e1b561f2252b5c0e0e67

    SHA1

    67ac88d73c24ab0b7f5224d6544bab466d3cfdbd

    SHA256

    961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711

    SHA512

    fb5c0287288ac310380925a9e71dd95df6b681b8c47e782f9747d20ced82d0501db58c5626df93d8c6601363dc7fa25906128a567a6ef5ef404bce5ca394921b

  • memory/1856-11-0x00000000072D0000-0x0000000007C9C000-memory.dmp

    Filesize

    9.8MB

  • memory/1856-16-0x00000000FFBD0000-0x00000000FFFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/1856-3-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

    Filesize

    4KB

  • memory/1856-2-0x0000000077E50000-0x0000000077E51000-memory.dmp

    Filesize

    4KB

  • memory/1856-4-0x0000000000B70000-0x000000000153C000-memory.dmp

    Filesize

    9.8MB

  • memory/1856-0-0x0000000000B70000-0x000000000153C000-memory.dmp

    Filesize

    9.8MB

  • memory/1856-1-0x00000000FFBD0000-0x00000000FFFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/1856-15-0x0000000000B70000-0x000000000153C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-12-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-29-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-19-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-25-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-18-0x0000000077E50000-0x0000000077E51000-memory.dmp

    Filesize

    4KB

  • memory/3060-23-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-26-0x00000000FFBD0000-0x00000000FFFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/3060-24-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-20-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-27-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-28-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-17-0x00000000FFBD0000-0x00000000FFFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/3060-30-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-31-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-32-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-33-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-34-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-35-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-36-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-37-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB

  • memory/3060-38-0x0000000000DA0000-0x000000000176C000-memory.dmp

    Filesize

    9.8MB