Analysis

  • max time kernel
    129s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-08-2024 23:05

General

  • Target

    gdfgdfgfdg.exe

  • Size

    45KB

  • MD5

    b1ff6fc37c6f30705b60421bad837ba1

  • SHA1

    86c14aa784f97ac9018bd33d2b2cda2606dc0679

  • SHA256

    009c7b94b0d9541477c43105707754fa3ad4962dc561533a4a0b86689f2518db

  • SHA512

    5bb2f33b6d7663a88290e0bffc81470614455da4ebf5ea8aae4e8b38b41d702dce1ca47616808f2cfd48c6061b935ec1379281bb43e56f4e1c153e1abb67ba09

  • SSDEEP

    768:1dhO/poiiUcjlJInUonH9Xqk5nWEZ5SbTDawWI7CPW56:Lw+jjgn/nH9XqcnW85SbTJWIS

Malware Config

Extracted

Family

xenorat

C2

related-directed.gl.at.ply.gg

Mutex

TestingRat

Attributes
  • install_path

    appdata

  • port

    3403

  • startup_name

    nothingset

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\gdfgdfgfdg.exe
    "C:\Users\Admin\AppData\Local\Temp\gdfgdfgfdg.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Roaming\XenoManager\gdfgdfgfdg.exe
      "C:\Users\Admin\AppData\Roaming\XenoManager\gdfgdfgfdg.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1228
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4136
    • C:\Users\Admin\AppData\Local\Temp\gdfgdfgfdg.exe
      "C:\Users\Admin\AppData\Local\Temp\gdfgdfgfdg.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      PID:1960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gdfgdfgfdg.exe.log

      Filesize

      226B

      MD5

      957779c42144282d8cd83192b8fbc7cf

      SHA1

      de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

      SHA256

      0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

      SHA512

      f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

    • C:\Users\Admin\AppData\Roaming\XenoManager\gdfgdfgfdg.exe

      Filesize

      45KB

      MD5

      b1ff6fc37c6f30705b60421bad837ba1

      SHA1

      86c14aa784f97ac9018bd33d2b2cda2606dc0679

      SHA256

      009c7b94b0d9541477c43105707754fa3ad4962dc561533a4a0b86689f2518db

      SHA512

      5bb2f33b6d7663a88290e0bffc81470614455da4ebf5ea8aae4e8b38b41d702dce1ca47616808f2cfd48c6061b935ec1379281bb43e56f4e1c153e1abb67ba09

    • memory/1228-9-0x00007FFF328A0000-0x00007FFF32A7B000-memory.dmp

      Filesize

      1.9MB

    • memory/2840-0-0x00007FFF328A0000-0x00007FFF32A7B000-memory.dmp

      Filesize

      1.9MB

    • memory/2840-1-0x0000000000550000-0x0000000000562000-memory.dmp

      Filesize

      72KB