Analysis

  • max time kernel
    119s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 07:28

General

  • Target

    ESTADO DE CUENTA.xll

  • Size

    819KB

  • MD5

    5475ac0337614b9651483ca83628c38f

  • SHA1

    d03d0806bb24207780b441a090e3ff9e9d263929

  • SHA256

    8eaf377f8fc59bb93ada3e1f94571ebbbc3d3732475c86239ee72e4c1f2f31c7

  • SHA512

    d4d7d417fbadb98ac94e728c994b4ae7abc505632a1eb79d8f8193c71daa7bbbf2aa709713ec94ffa9b645dcf02b06907cd3fe1538840dfc22411c229bbcdb8c

  • SSDEEP

    12288:xG1N4HkcgMsiOd58bzbBSre6Q0uqZzD1reWabd/dbNZEEx/DLn0vkYHipwyA:xoOOMX1K+QHT+d9NZdxYHip

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

xenorat

C2

91.92.248.167

Mutex

Wolid_rat_nd8889g

Attributes
  • delay

    60000

  • install_path

    appdata

  • port

    1279

  • startup_name

    qns

Signatures

  • Detect XenoRat Payload 1 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ESTADO DE CUENTA.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
      "C:\Users\Admin\AppData\Local\Temp\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4340
      • C:\Users\Admin\AppData\Local\Temp\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
        C:\Users\Admin\AppData\Local\Temp\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Users\Admin\AppData\Roaming\XenoManager\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
          "C:\Users\Admin\AppData\Roaming\XenoManager\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Users\Admin\AppData\Roaming\XenoManager\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
            C:\Users\Admin\AppData\Roaming\XenoManager\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5116
          • C:\Users\Admin\AppData\Roaming\XenoManager\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
            C:\Users\Admin\AppData\Roaming\XenoManager\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
            5⤵
            • Executes dropped EXE
            PID:2368
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 80
              6⤵
              • Program crash
              PID:1648
          • C:\Users\Admin\AppData\Roaming\XenoManager\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
            C:\Users\Admin\AppData\Roaming\XenoManager\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3520
      • C:\Users\Admin\AppData\Local\Temp\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
        C:\Users\Admin\AppData\Local\Temp\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1964
      • C:\Users\Admin\AppData\Local\Temp\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
        C:\Users\Admin\AppData\Local\Temp\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2088
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /Create /TN "qns" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC2FD.tmp" /F
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:5044
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2368 -ip 2368
    1⤵
      PID:1152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe.log

      Filesize

      522B

      MD5

      8334a471a4b492ece225b471b8ad2fc8

      SHA1

      1cb24640f32d23e8f7800bd0511b7b9c3011d992

      SHA256

      5612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169

      SHA512

      56ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36

    • C:\Users\Admin\AppData\Local\Temp\13ba226c-de2d-47a3-81f8-09b6ab80bfb6.exe

      Filesize

      233KB

      MD5

      025593cacb392aadf7266febcb9f700a

      SHA1

      602a4fcbbdaf682dc6311dc72468a00eb148ca86

      SHA256

      6b09a61d15fd9835db561b9f7571c714333a071cce0facd8ac3dc39289ef8998

      SHA512

      8e5c571c4905b418446cea26d8ef978706d1deb209227c602b8dbc5e9b9d23379bf42169887ee81dd287b9c07e43df733ffa7a72e4e279f9dfcec490710ed947

    • C:\Users\Admin\AppData\Local\Temp\ESTADO DE CUENTA.xll

      Filesize

      819KB

      MD5

      5475ac0337614b9651483ca83628c38f

      SHA1

      d03d0806bb24207780b441a090e3ff9e9d263929

      SHA256

      8eaf377f8fc59bb93ada3e1f94571ebbbc3d3732475c86239ee72e4c1f2f31c7

      SHA512

      d4d7d417fbadb98ac94e728c994b4ae7abc505632a1eb79d8f8193c71daa7bbbf2aa709713ec94ffa9b645dcf02b06907cd3fe1538840dfc22411c229bbcdb8c

    • C:\Users\Admin\AppData\Local\Temp\tmpC2FD.tmp

      Filesize

      1KB

      MD5

      7428ddd31a421aad161f81113b152b3b

      SHA1

      c9cd9330d39f5d21ff53b035795b61962b319e2a

      SHA256

      7a95d329dad98dd3ee82ab2c1c0cd47c17797796d2bbadbbbf99f97a8cd5b782

      SHA512

      634d800455a7bcedc5ab93158011f055e6e9984eef9f3e34034dcd25dcd5c334d318eae3751af5598d26b92c79a7216b53d913c4dec13a574d873823428f50f2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

      Filesize

      1KB

      MD5

      1e6c49075764a7dd0a5e40f5a9e3c4f1

      SHA1

      1d8483b1b8eaac6d1890711f8000f7bcb67c2639

      SHA256

      7502ee58d4a7355f4cde6a9a698e22a471388423435f8e5b64b931f10a25d065

      SHA512

      c27560bdc8a941b66f1858652e5914f6066f4e7c86bb98b2c85130f58aca7ccc57011a876488af12762295af507a73bedfe214d028136c065d3696c71b4c996f

    • memory/2472-26-0x0000022AD3050000-0x0000022AD3136000-memory.dmp

      Filesize

      920KB

    • memory/2472-11-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-5-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-2-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/2472-9-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-10-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-29-0x0000022AD31A0000-0x0000022AD31B4000-memory.dmp

      Filesize

      80KB

    • memory/2472-8-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-12-0x00007FFC7A4F0000-0x00007FFC7A500000-memory.dmp

      Filesize

      64KB

    • memory/2472-7-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-6-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/2472-30-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-14-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-16-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-19-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-22-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-21-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-20-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-18-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-17-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-27-0x0000022AD31A0000-0x0000022AD31B4000-memory.dmp

      Filesize

      80KB

    • memory/2472-4-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/2472-24-0x0000022AD3E10000-0x0000022AD3EF6000-memory.dmp

      Filesize

      920KB

    • memory/2472-28-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-15-0x00007FFC7A4F0000-0x00007FFC7A500000-memory.dmp

      Filesize

      64KB

    • memory/2472-3-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/2472-13-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-32-0x0000022AD4010000-0x0000022AD4194000-memory.dmp

      Filesize

      1.5MB

    • memory/2472-31-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-33-0x0000022AD32F0000-0x0000022AD332C000-memory.dmp

      Filesize

      240KB

    • memory/2472-34-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-35-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-36-0x0000022AD4190000-0x0000022AD41D4000-memory.dmp

      Filesize

      272KB

    • memory/2472-82-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-1-0x00007FFCBCC0D000-0x00007FFCBCC0E000-memory.dmp

      Filesize

      4KB

    • memory/2472-0-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/2472-93-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-92-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-91-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-84-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/2472-83-0x00007FFCBCC0D000-0x00007FFCBCC0E000-memory.dmp

      Filesize

      4KB

    • memory/2596-56-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/4340-55-0x00000000046C0000-0x00000000046C6000-memory.dmp

      Filesize

      24KB

    • memory/4340-54-0x000000000D8E0000-0x000000000D97C000-memory.dmp

      Filesize

      624KB

    • memory/4340-53-0x000000000D800000-0x000000000D83E000-memory.dmp

      Filesize

      248KB

    • memory/4340-52-0x0000000004BE0000-0x0000000004BE6000-memory.dmp

      Filesize

      24KB

    • memory/4340-51-0x00000000002C0000-0x0000000000300000-memory.dmp

      Filesize

      256KB

    • memory/4340-50-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4340-65-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB