Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 23:36
Behavioral task
behavioral1
Sample
6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe
Resource
win7-20240903-en
General
-
Target
6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe
-
Size
45KB
-
MD5
bb8712b4382955760eb56b2db9f1965d
-
SHA1
b40feb63f86dca36a4accb9b96aff9bf95b1eb43
-
SHA256
6c7ccc122fac3ed22879b0b82b2874a375ec9236827127ec784eafc607740a83
-
SHA512
a592e17c3a417a4a50c5b45800ff1db3514ddeb70b6153e5c9ebfb1f13d4482035847d313e188e6158f4eb527a471f25d8d53762d9c812fa6932794084f036e4
-
SSDEEP
768:NdhO/poiiUcjlJInywH9Xqk5nWEZ5SbTDa6WI7CPW5c:Dw+jjgnLH9XqcnW85SbT7WIk
Malware Config
Extracted
xenorat
49.194.29.240
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
MicrosoftAudioService
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2860-1-0x0000000000BE0000-0x0000000000BF2000-memory.dmp family_xenorat behavioral1/files/0x0008000000016cd1-7.dat family_xenorat behavioral1/memory/2312-9-0x0000000000D80000-0x0000000000D92000-memory.dmp family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe -
Loads dropped DLL 1 IoCs
pid Process 2860 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2312 2860 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 28 PID 2860 wrote to memory of 2312 2860 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 28 PID 2860 wrote to memory of 2312 2860 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 28 PID 2860 wrote to memory of 2312 2860 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 28 PID 2312 wrote to memory of 2568 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 29 PID 2312 wrote to memory of 2568 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 29 PID 2312 wrote to memory of 2568 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 29 PID 2312 wrote to memory of 2568 2312 6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe"C:\Users\Admin\AppData\Local\Temp\6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\XenoManager\6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe"C:\Users\Admin\AppData\Roaming\XenoManager\6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "MicrosoftAudioService" /XML "C:\Users\Admin\AppData\Local\Temp\tmp977F.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d850700f566c8906b827b9cf02c60059
SHA1b352fb136db918c1658938a8611302df7eeed70c
SHA2561d148b6a5d40e4aa992840d202ece1c619c46efc7ae0f10f331911b03d6d1a6d
SHA51283dea1bce62e76e8d69fbb8f58d59037dffaba9db1d694505fd09990817451d14000d2f80f96238e0e91e30cf95452ab38bf57ded26aea27fb3e917e8a220848
-
Filesize
45KB
MD5bb8712b4382955760eb56b2db9f1965d
SHA1b40feb63f86dca36a4accb9b96aff9bf95b1eb43
SHA2566c7ccc122fac3ed22879b0b82b2874a375ec9236827127ec784eafc607740a83
SHA512a592e17c3a417a4a50c5b45800ff1db3514ddeb70b6153e5c9ebfb1f13d4482035847d313e188e6158f4eb527a471f25d8d53762d9c812fa6932794084f036e4