Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
c0e69f17e4280f555c04e474daea1550N.exe
Resource
win7-20240903-en
General
-
Target
c0e69f17e4280f555c04e474daea1550N.exe
-
Size
240KB
-
MD5
c0e69f17e4280f555c04e474daea1550
-
SHA1
aa4dab6524ff4454dccbfe18a2e9c7f4273c145f
-
SHA256
f1cc57e8b861331e8bdad79a3823a919144e73da49879d1d326a8be2c20a47b9
-
SHA512
62d61b9d852994e4b31b7aaf5d243b4c9ccb9d26846cb7e2ca0277e632eb7eff3429f4ab942d07bc9710a983ffeb875ee257fc2961d31a37d9a4eb2b119d8799
-
SSDEEP
6144:nuwfQNZBN/yx3kJTcqszwMUrSXBO0YyoyXFPI:nuwYNI0JTrMO0YyoyXFg
Malware Config
Extracted
xenorat
154.216.17.155
Xeno_rat_nd8912d
-
delay
50000
-
install_path
appdata
-
port
1357
-
startup_name
crsr
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2736-6-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2736-16-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2736-8-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Executes dropped EXE 3 IoCs
pid Process 2544 c0e69f17e4280f555c04e474daea1550N.exe 2716 c0e69f17e4280f555c04e474daea1550N.exe 2584 c0e69f17e4280f555c04e474daea1550N.exe -
Loads dropped DLL 1 IoCs
pid Process 2736 c0e69f17e4280f555c04e474daea1550N.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2460 set thread context of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 set thread context of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2544 set thread context of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 set thread context of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e69f17e4280f555c04e474daea1550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e69f17e4280f555c04e474daea1550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e69f17e4280f555c04e474daea1550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e69f17e4280f555c04e474daea1550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e69f17e4280f555c04e474daea1550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e69f17e4280f555c04e474daea1550N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1396 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2460 c0e69f17e4280f555c04e474daea1550N.exe Token: SeDebugPrivilege 2544 c0e69f17e4280f555c04e474daea1550N.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 wrote to memory of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 wrote to memory of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 wrote to memory of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 wrote to memory of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 wrote to memory of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 wrote to memory of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 wrote to memory of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 wrote to memory of 2736 2460 c0e69f17e4280f555c04e474daea1550N.exe 31 PID 2460 wrote to memory of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2460 wrote to memory of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2460 wrote to memory of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2460 wrote to memory of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2460 wrote to memory of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2460 wrote to memory of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2460 wrote to memory of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2460 wrote to memory of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2460 wrote to memory of 2188 2460 c0e69f17e4280f555c04e474daea1550N.exe 32 PID 2736 wrote to memory of 2544 2736 c0e69f17e4280f555c04e474daea1550N.exe 33 PID 2736 wrote to memory of 2544 2736 c0e69f17e4280f555c04e474daea1550N.exe 33 PID 2736 wrote to memory of 2544 2736 c0e69f17e4280f555c04e474daea1550N.exe 33 PID 2736 wrote to memory of 2544 2736 c0e69f17e4280f555c04e474daea1550N.exe 33 PID 2544 wrote to memory of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 wrote to memory of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 wrote to memory of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 wrote to memory of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 wrote to memory of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 wrote to memory of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 wrote to memory of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 wrote to memory of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 wrote to memory of 2716 2544 c0e69f17e4280f555c04e474daea1550N.exe 34 PID 2544 wrote to memory of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 PID 2544 wrote to memory of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 PID 2544 wrote to memory of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 PID 2544 wrote to memory of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 PID 2544 wrote to memory of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 PID 2544 wrote to memory of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 PID 2544 wrote to memory of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 PID 2544 wrote to memory of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 PID 2544 wrote to memory of 2584 2544 c0e69f17e4280f555c04e474daea1550N.exe 35 PID 2188 wrote to memory of 1396 2188 c0e69f17e4280f555c04e474daea1550N.exe 36 PID 2188 wrote to memory of 1396 2188 c0e69f17e4280f555c04e474daea1550N.exe 36 PID 2188 wrote to memory of 1396 2188 c0e69f17e4280f555c04e474daea1550N.exe 36 PID 2188 wrote to memory of 1396 2188 c0e69f17e4280f555c04e474daea1550N.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0e69f17e4280f555c04e474daea1550N.exe"C:\Users\Admin\AppData\Local\Temp\c0e69f17e4280f555c04e474daea1550N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\c0e69f17e4280f555c04e474daea1550N.exeC:\Users\Admin\AppData\Local\Temp\c0e69f17e4280f555c04e474daea1550N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Roaming\XenoManager\c0e69f17e4280f555c04e474daea1550N.exe"C:\Users\Admin\AppData\Roaming\XenoManager\c0e69f17e4280f555c04e474daea1550N.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\XenoManager\c0e69f17e4280f555c04e474daea1550N.exeC:\Users\Admin\AppData\Roaming\XenoManager\c0e69f17e4280f555c04e474daea1550N.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\c0e69f17e4280f555c04e474daea1550N.exeC:\Users\Admin\AppData\Roaming\XenoManager\c0e69f17e4280f555c04e474daea1550N.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c0e69f17e4280f555c04e474daea1550N.exeC:\Users\Admin\AppData\Local\Temp\c0e69f17e4280f555c04e474daea1550N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "crsr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9F1D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c4346c638b78f068de79266424b67905
SHA16bda16946311735fb05bd257594002068283cbe1
SHA2565058baeaea6c7e3e6609364602fafd480f9b0531cabc3d39ed980f2b0f865d0f
SHA51296a75a4cd651995fe1e1365082aaf085d84d83d7a043f2582a08d20378f7fcf14a884eb15e62de8c840217eea511140d9727026b9ac6a2bd86a2e7b91dca2899
-
Filesize
240KB
MD5c0e69f17e4280f555c04e474daea1550
SHA1aa4dab6524ff4454dccbfe18a2e9c7f4273c145f
SHA256f1cc57e8b861331e8bdad79a3823a919144e73da49879d1d326a8be2c20a47b9
SHA51262d61b9d852994e4b31b7aaf5d243b4c9ccb9d26846cb7e2ca0277e632eb7eff3429f4ab942d07bc9710a983ffeb875ee257fc2961d31a37d9a4eb2b119d8799