Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 09:25
Behavioral task
behavioral1
Sample
Xeno cracked.exe
Resource
win7-20240708-en
General
-
Target
Xeno cracked.exe
-
Size
45KB
-
MD5
59307cec9fb56ca3d3ae65fae24346b4
-
SHA1
cf118db01073c3c1a761c2edee06272f0b53d04e
-
SHA256
9cb32b8bc56f56963b0e7c14649177329b6d995e8fd0d8045d9efea9ad567bff
-
SHA512
58da19d63fe21446991488590fbbe952e4ce4956160985c8536d545b28506fb8cea84ea8f478fbdb1b34bd9b794b4edaa0dc444ec30e7bbe26d7a8a928ec1a0f
-
SSDEEP
768:OdhO/poiiUcjlJInX3EH9Xqk5nWEZ5SbTDatuI7CPW5/:Yw+jjgnHEH9XqcnW85SbTIuIH
Malware Config
Extracted
xenorat
192.168.8.31
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
25565
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Xeno cracked.exe -
Executes dropped EXE 1 IoCs
pid Process 4844 Xeno cracked.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1712 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4976 wrote to memory of 4844 4976 Xeno cracked.exe 93 PID 4976 wrote to memory of 4844 4976 Xeno cracked.exe 93 PID 4976 wrote to memory of 4844 4976 Xeno cracked.exe 93 PID 4844 wrote to memory of 1712 4844 Xeno cracked.exe 100 PID 4844 wrote to memory of 1712 4844 Xeno cracked.exe 100 PID 4844 wrote to memory of 1712 4844 Xeno cracked.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno cracked.exe"C:\Users\Admin\AppData\Local\Temp\Xeno cracked.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Roaming\XenoManager\Xeno cracked.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Xeno cracked.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4263.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1712
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:4940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5781fb99b517273e88acc4fa2819a0018
SHA18b5937566e477c476fbfc380a07d43220f510e18
SHA2566a954d7d3f8387e01b6cd6129704a7d97ce476eec7046a012377c95209638bd0
SHA512b47c7315098b616a015d8916b45a2c2afe05fedeec9655cce97085175d7fb121e29e5ee4fc7a66ac226fea531061e6630f921966d4be43542e9fbf493b1b27f2
-
Filesize
45KB
MD559307cec9fb56ca3d3ae65fae24346b4
SHA1cf118db01073c3c1a761c2edee06272f0b53d04e
SHA2569cb32b8bc56f56963b0e7c14649177329b6d995e8fd0d8045d9efea9ad567bff
SHA51258da19d63fe21446991488590fbbe952e4ce4956160985c8536d545b28506fb8cea84ea8f478fbdb1b34bd9b794b4edaa0dc444ec30e7bbe26d7a8a928ec1a0f