Analysis Overview
SHA256
a64fb3bf19974ad4369f1cbf8ab7cd5cf598462fb623788f9fd51b86b8361839
Threat Level: Known bad
The file imageloggerV2.exe was found to be: Known bad.
Malicious Activity Summary
XenorRat
Xenorat family
Unsigned PE
System Location Discovery: System Language Discovery
Scheduled Task/Job: Scheduled Task
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-23 08:48
Signatures
Xenorat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-23 08:48
Reported
2024-08-23 08:49
Platform
win7-20240704-en
Max time kernel
19s
Max time network
22s
Command Line
Signatures
XenorRat
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2152 wrote to memory of 1304 | N/A | C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2152 wrote to memory of 1304 | N/A | C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2152 wrote to memory of 1304 | N/A | C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2152 wrote to memory of 1304 | N/A | C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe | C:\Windows\SysWOW64\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe
"C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "java updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5947.tmp" /F
Network
| Country | Destination | Domain | Proto |
| N/A | 192.168.1.164:4444 | tcp |
Files
memory/2152-0-0x00000000748EE000-0x00000000748EF000-memory.dmp
memory/2152-1-0x00000000010B0000-0x00000000010C2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp5947.tmp
| MD5 | ce955dcb247ce96a637084e133c4725a |
| SHA1 | 1bf73a3591d8614403bd13bfd346b9ea63612412 |
| SHA256 | 8629ef3ecc2381051d89279bd8971a21be72c4ebfd581d428eef5544d958b2e8 |
| SHA512 | 667bf77e9acb177842834a43cc83f3a1aa1c7c35ca8e2f3bf14a02fcfcec8350d2124f2259a0d92f1c026b1aa9db0c1af3e2b769c7b98c3487525bcfc5927e06 |
memory/2152-4-0x00000000748E0000-0x0000000074FCE000-memory.dmp
memory/2152-5-0x00000000748EE000-0x00000000748EF000-memory.dmp
memory/2152-6-0x00000000748E0000-0x0000000074FCE000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-23 08:48
Reported
2024-08-23 08:49
Platform
win10v2004-20240802-en
Max time kernel
33s
Max time network
33s
Command Line
Signatures
XenorRat
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1644 wrote to memory of 1496 | N/A | C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 1644 wrote to memory of 1496 | N/A | C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 1644 wrote to memory of 1496 | N/A | C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe | C:\Windows\SysWOW64\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe
"C:\Users\Admin\AppData\Local\Temp\imageloggerV2.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "java updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD002.tmp" /F
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| N/A | 192.168.1.164:4444 | tcp | |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
memory/1644-0-0x0000000074C4E000-0x0000000074C4F000-memory.dmp
memory/1644-1-0x0000000000E30000-0x0000000000E42000-memory.dmp
memory/1644-2-0x0000000074C40000-0x00000000753F0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpD002.tmp
| MD5 | ce955dcb247ce96a637084e133c4725a |
| SHA1 | 1bf73a3591d8614403bd13bfd346b9ea63612412 |
| SHA256 | 8629ef3ecc2381051d89279bd8971a21be72c4ebfd581d428eef5544d958b2e8 |
| SHA512 | 667bf77e9acb177842834a43cc83f3a1aa1c7c35ca8e2f3bf14a02fcfcec8350d2124f2259a0d92f1c026b1aa9db0c1af3e2b769c7b98c3487525bcfc5927e06 |
memory/1644-5-0x0000000074C4E000-0x0000000074C4F000-memory.dmp
memory/1644-6-0x0000000074C40000-0x00000000753F0000-memory.dmp