Analysis

  • max time kernel
    72s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2024 16:43

General

  • Target

    aimware_crack.vxm.exe

  • Size

    1.6MB

  • MD5

    dc85bae1202fceec41a1af1add6b111c

  • SHA1

    51efca3566ca1650018d2693df6f05ff0f9370b5

  • SHA256

    a38af349ae73b656ded80425ebdedec049d65da5daa7259cb868fcd9ffde9005

  • SHA512

    3626c272a9d8c22f39d7d7d93b0953316272f03908692f83b183e1489c9a3bc487a8d40f3cf667754d685d849745ef49576ba0b59e9e125686a3b379e27a4a35

  • SSDEEP

    49152:puc4UKe2JzShwl+fq+tWWn/yxQSIpYci:pNzK5zSW6qDW/yxQSAi

Malware Config

Extracted

Family

xenorat

C2

147.185.221.21

Mutex

nd8912d

Attributes
  • delay

    3000

  • install_path

    appdata

  • port

    6663

  • startup_name

    svchost.exe

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 56 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aimware_crack.vxm.exe
    "C:\Users\Admin\AppData\Local\Temp\aimware_crack.vxm.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2496
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2312
    • C:\Users\Admin\AppData\Local\Temp\aimware_crack.vxm.exe
      "C:\Users\Admin\AppData\Local\Temp\aimware_crack.vxm.exe"
      1⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2496-1-0x000000007477E000-0x000000007477F000-memory.dmp

      Filesize

      4KB

    • memory/2496-2-0x0000000004850000-0x0000000004862000-memory.dmp

      Filesize

      72KB

    • memory/2496-3-0x0000000074770000-0x0000000074F20000-memory.dmp

      Filesize

      7.7MB

    • memory/2496-4-0x0000000074770000-0x0000000074F20000-memory.dmp

      Filesize

      7.7MB

    • memory/2496-5-0x0000000074770000-0x0000000074F20000-memory.dmp

      Filesize

      7.7MB

    • memory/2496-6-0x0000000074770000-0x0000000074F20000-memory.dmp

      Filesize

      7.7MB

    • memory/3588-8-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

      Filesize

      72KB

    • memory/3588-9-0x0000000074770000-0x0000000074F20000-memory.dmp

      Filesize

      7.7MB

    • memory/3588-10-0x0000000074770000-0x0000000074F20000-memory.dmp

      Filesize

      7.7MB

    • memory/3588-11-0x0000000074770000-0x0000000074F20000-memory.dmp

      Filesize

      7.7MB

    • memory/3588-12-0x0000000074770000-0x0000000074F20000-memory.dmp

      Filesize

      7.7MB