Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 13:34
Behavioral task
behavioral1
Sample
Xenocracked.exe
Resource
win7-20240704-en
General
-
Target
Xenocracked.exe
-
Size
45KB
-
MD5
59307cec9fb56ca3d3ae65fae24346b4
-
SHA1
cf118db01073c3c1a761c2edee06272f0b53d04e
-
SHA256
9cb32b8bc56f56963b0e7c14649177329b6d995e8fd0d8045d9efea9ad567bff
-
SHA512
58da19d63fe21446991488590fbbe952e4ce4956160985c8536d545b28506fb8cea84ea8f478fbdb1b34bd9b794b4edaa0dc444ec30e7bbe26d7a8a928ec1a0f
-
SSDEEP
768:OdhO/poiiUcjlJInX3EH9Xqk5nWEZ5SbTDatuI7CPW5/:Yw+jjgnHEH9XqcnW85SbTIuIH
Malware Config
Extracted
xenorat
192.168.8.31
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
25565
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Xenocracked.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 Xenocracked.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xenocracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xenocracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4552 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2816 4588 Xenocracked.exe 86 PID 4588 wrote to memory of 2816 4588 Xenocracked.exe 86 PID 4588 wrote to memory of 2816 4588 Xenocracked.exe 86 PID 2816 wrote to memory of 4552 2816 Xenocracked.exe 94 PID 2816 wrote to memory of 4552 2816 Xenocracked.exe 94 PID 2816 wrote to memory of 4552 2816 Xenocracked.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xenocracked.exe"C:\Users\Admin\AppData\Local\Temp\Xenocracked.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\XenoManager\Xenocracked.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Xenocracked.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDD60.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD550c45a0c724ef08fd0385abf4168c855
SHA1b329cb93e4008a6a2f3a134cba877add496e559e
SHA256729525eb8e22a96757fbce0324c1107476c7eccc5b75046169693b89ce22d6cd
SHA5120c4b888b706e01b96b7782395fd589b8c38ae4fddf607693280832d0145e3e90fffc20d98ea63ec0b2d579f6ff0bc5614fc2d153270ff3e9cd7e0a294a924376
-
Filesize
45KB
MD559307cec9fb56ca3d3ae65fae24346b4
SHA1cf118db01073c3c1a761c2edee06272f0b53d04e
SHA2569cb32b8bc56f56963b0e7c14649177329b6d995e8fd0d8045d9efea9ad567bff
SHA51258da19d63fe21446991488590fbbe952e4ce4956160985c8536d545b28506fb8cea84ea8f478fbdb1b34bd9b794b4edaa0dc444ec30e7bbe26d7a8a928ec1a0f