Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-08-2024 00:53

General

  • Target

    961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe

  • Size

    2.4MB

  • MD5

    19f800a3a545e1b561f2252b5c0e0e67

  • SHA1

    67ac88d73c24ab0b7f5224d6544bab466d3cfdbd

  • SHA256

    961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711

  • SHA512

    fb5c0287288ac310380925a9e71dd95df6b681b8c47e782f9747d20ced82d0501db58c5626df93d8c6601363dc7fa25906128a567a6ef5ef404bce5ca394921b

  • SSDEEP

    49152:lU9LXFXogd7j9ja4byzZwDNvuVxvxNlzQjxkdCv0FYtaPyZ9yLVJoWriNIZF5:lUV5HjOwGxJN+jxkdKbtaPYyLVJoY

Malware Config

Extracted

Family

xenorat

C2

178.214.236.32

Mutex

Хост-процесс для задач Windows

Attributes
  • delay

    500

  • install_path

    temp

  • port

    3450

  • startup_name

    Хост-процесс для задач Windows

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe
    "C:\Users\Admin\AppData\Local\Temp\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Users\Admin\AppData\Local\Temp\XenoManager\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe
      "C:\Users\Admin\AppData\Local\Temp\XenoManager\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "Хост-процесс для задач Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmp922E.tmp" /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\XenoManager\961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe

    Filesize

    2.4MB

    MD5

    19f800a3a545e1b561f2252b5c0e0e67

    SHA1

    67ac88d73c24ab0b7f5224d6544bab466d3cfdbd

    SHA256

    961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711

    SHA512

    fb5c0287288ac310380925a9e71dd95df6b681b8c47e782f9747d20ced82d0501db58c5626df93d8c6601363dc7fa25906128a567a6ef5ef404bce5ca394921b

  • C:\Users\Admin\AppData\Local\Temp\tmp922E.tmp

    Filesize

    1KB

    MD5

    e6c9b2554967d71e1d716a732791d83c

    SHA1

    d723c3e6db122b5d11fa7b981b4d00788238afb2

    SHA256

    7839dd13711e91ed0cbe9a2b7fac3b89ed82931a0c82ab95d68c021c448a4176

    SHA512

    6975087fef8cc03691491bde88d2d7194a542594d7c3438276c82da292e2407e232de2c26998cc0b16e88fcf799979e293024dd19837389587403b95a5940606

  • memory/2632-37-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-38-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-30-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-18-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-31-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-45-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-19-0x00000000FEED0000-0x00000000FF2A1000-memory.dmp

    Filesize

    3.8MB

  • memory/2632-22-0x0000000077BF2000-0x0000000077BF3000-memory.dmp

    Filesize

    4KB

  • memory/2632-44-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-24-0x000000007493E000-0x000000007493F000-memory.dmp

    Filesize

    4KB

  • memory/2632-25-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-26-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-27-0x0000000074930000-0x00000000750E0000-memory.dmp

    Filesize

    7.7MB

  • memory/2632-43-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-42-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-46-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-41-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-33-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-34-0x0000000074930000-0x00000000750E0000-memory.dmp

    Filesize

    7.7MB

  • memory/2632-35-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-36-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-40-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/2632-32-0x00000000FEED0000-0x00000000FF2A1000-memory.dmp

    Filesize

    3.8MB

  • memory/2632-39-0x0000000000A30000-0x00000000013FC000-memory.dmp

    Filesize

    9.8MB

  • memory/3996-0-0x0000000000B00000-0x00000000014CC000-memory.dmp

    Filesize

    9.8MB

  • memory/3996-4-0x0000000000B00000-0x00000000014CC000-memory.dmp

    Filesize

    9.8MB

  • memory/3996-3-0x000000007493E000-0x000000007493F000-memory.dmp

    Filesize

    4KB

  • memory/3996-1-0x00000000FF530000-0x00000000FF901000-memory.dmp

    Filesize

    3.8MB

  • memory/3996-2-0x0000000077BF2000-0x0000000077BF3000-memory.dmp

    Filesize

    4KB

  • memory/3996-21-0x00000000FF530000-0x00000000FF901000-memory.dmp

    Filesize

    3.8MB

  • memory/3996-20-0x0000000000B00000-0x00000000014CC000-memory.dmp

    Filesize

    9.8MB