Analysis Overview
SHA256
fe334383fda5544da762cfdf0e63b67f8353697bd978954eab09c6edba951488
Threat Level: Known bad
The file Password a.rar was found to be: Known bad.
Malicious Activity Summary
Xenorat family
XenorRat
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Enumerates physical storage devices
Unsigned PE
System Location Discovery: System Language Discovery
Scheduled Task/Job: Scheduled Task
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-09-01 08:49
Signatures
Xenorat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-09-01 08:49
Reported
2024-09-02 01:41
Platform
win7-20240704-en
Max time kernel
589s
Max time network
360s
Command Line
Signatures
XenorRat
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe
"C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "System-33" /XML "C:\Users\Admin\AppData\Local\Temp\tmpADEB.tmp" /F
Network
| Country | Destination | Domain | Proto |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp |
Files
memory/2240-0-0x0000000074D8E000-0x0000000074D8F000-memory.dmp
memory/2240-1-0x00000000002E0000-0x00000000002F2000-memory.dmp
\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe
| MD5 | 5ef7344600895b2f13d5d8e44537d946 |
| SHA1 | bdf05e86b0c923a0c1edead40cc50819b185d4c0 |
| SHA256 | 50866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0 |
| SHA512 | 9563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69 |
memory/1652-9-0x0000000000050000-0x0000000000062000-memory.dmp
memory/1652-11-0x0000000074D80000-0x000000007546E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpADEB.tmp
| MD5 | 2ab093f77a33e7004e362f78c87763a8 |
| SHA1 | 2a4dcef9285dd583a33c1c5195cac7a37daee193 |
| SHA256 | 4691f336ef4ce21e9f11416ab10393a8d4760db2025cfc0bd59acc25e018e234 |
| SHA512 | 343b32e2048b259717e04dd98ef8900f3951ca79169947f1ed642b76965d95d517bd5a7878897aee21bd4350ac96aa1240e9d7e86e0fb53b05e28da716e95d3f |
memory/1652-13-0x0000000074D80000-0x000000007546E000-memory.dmp
memory/1652-14-0x0000000074D80000-0x000000007546E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-09-01 08:49
Reported
2024-09-02 01:42
Platform
win10v2004-20240802-en
Max time kernel
594s
Max time network
439s
Command Line
Signatures
XenorRat
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4044 wrote to memory of 4936 | N/A | C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe |
| PID 4044 wrote to memory of 4936 | N/A | C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe |
| PID 4044 wrote to memory of 4936 | N/A | C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe |
| PID 4936 wrote to memory of 812 | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 4936 wrote to memory of 812 | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 4936 wrote to memory of 812 | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe | C:\Windows\SysWOW64\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe
"C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe"
C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "System-33" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7196.tmp" /F
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| N/A | 127.0.0.1:69 | tcp | |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 37.56.20.217.in-addr.arpa | udp |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| US | 8.8.8.8:53 | 95.16.208.104.in-addr.arpa | udp |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp | |
| N/A | 127.0.0.1:69 | tcp |
Files
memory/4044-0-0x0000000074E0E000-0x0000000074E0F000-memory.dmp
memory/4044-1-0x0000000000730000-0x0000000000742000-memory.dmp
C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe
| MD5 | 5ef7344600895b2f13d5d8e44537d946 |
| SHA1 | bdf05e86b0c923a0c1edead40cc50819b185d4c0 |
| SHA256 | 50866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0 |
| SHA512 | 9563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69 |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Fixer.exe.log
| MD5 | 916851e072fbabc4796d8916c5131092 |
| SHA1 | d48a602229a690c512d5fdaf4c8d77547a88e7a2 |
| SHA256 | 7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d |
| SHA512 | 07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521 |
memory/4936-16-0x0000000074E00000-0x00000000755B0000-memory.dmp
memory/4936-17-0x0000000074E00000-0x00000000755B0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp7196.tmp
| MD5 | 2ab093f77a33e7004e362f78c87763a8 |
| SHA1 | 2a4dcef9285dd583a33c1c5195cac7a37daee193 |
| SHA256 | 4691f336ef4ce21e9f11416ab10393a8d4760db2025cfc0bd59acc25e018e234 |
| SHA512 | 343b32e2048b259717e04dd98ef8900f3951ca79169947f1ed642b76965d95d517bd5a7878897aee21bd4350ac96aa1240e9d7e86e0fb53b05e28da716e95d3f |
memory/4936-19-0x0000000074E00000-0x00000000755B0000-memory.dmp