Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 09:25
Behavioral task
behavioral1
Sample
Xeno cracked.exe
Resource
win7-20240708-en
General
-
Target
Xeno cracked.exe
-
Size
45KB
-
MD5
59307cec9fb56ca3d3ae65fae24346b4
-
SHA1
cf118db01073c3c1a761c2edee06272f0b53d04e
-
SHA256
9cb32b8bc56f56963b0e7c14649177329b6d995e8fd0d8045d9efea9ad567bff
-
SHA512
58da19d63fe21446991488590fbbe952e4ce4956160985c8536d545b28506fb8cea84ea8f478fbdb1b34bd9b794b4edaa0dc444ec30e7bbe26d7a8a928ec1a0f
-
SSDEEP
768:OdhO/poiiUcjlJInX3EH9Xqk5nWEZ5SbTDatuI7CPW5/:Yw+jjgnHEH9XqcnW85SbTIuIH
Malware Config
Extracted
xenorat
192.168.8.31
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
25565
-
startup_name
nothingset
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 Xeno cracked.exe -
Loads dropped DLL 1 IoCs
pid Process 2356 Xeno cracked.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno cracked.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2588 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2756 2356 Xeno cracked.exe 30 PID 2356 wrote to memory of 2756 2356 Xeno cracked.exe 30 PID 2356 wrote to memory of 2756 2356 Xeno cracked.exe 30 PID 2356 wrote to memory of 2756 2356 Xeno cracked.exe 30 PID 2756 wrote to memory of 2588 2756 Xeno cracked.exe 31 PID 2756 wrote to memory of 2588 2756 Xeno cracked.exe 31 PID 2756 wrote to memory of 2588 2756 Xeno cracked.exe 31 PID 2756 wrote to memory of 2588 2756 Xeno cracked.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno cracked.exe"C:\Users\Admin\AppData\Local\Temp\Xeno cracked.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\XenoManager\Xeno cracked.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Xeno cracked.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp20CA.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5781fb99b517273e88acc4fa2819a0018
SHA18b5937566e477c476fbfc380a07d43220f510e18
SHA2566a954d7d3f8387e01b6cd6129704a7d97ce476eec7046a012377c95209638bd0
SHA512b47c7315098b616a015d8916b45a2c2afe05fedeec9655cce97085175d7fb121e29e5ee4fc7a66ac226fea531061e6630f921966d4be43542e9fbf493b1b27f2
-
Filesize
45KB
MD559307cec9fb56ca3d3ae65fae24346b4
SHA1cf118db01073c3c1a761c2edee06272f0b53d04e
SHA2569cb32b8bc56f56963b0e7c14649177329b6d995e8fd0d8045d9efea9ad567bff
SHA51258da19d63fe21446991488590fbbe952e4ce4956160985c8536d545b28506fb8cea84ea8f478fbdb1b34bd9b794b4edaa0dc444ec30e7bbe26d7a8a928ec1a0f