Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 21:20
Behavioral task
behavioral1
Sample
xeno.exe
Resource
win7-20241010-en
General
-
Target
xeno.exe
-
Size
45KB
-
MD5
30a770a78bcf9ba6f546fa358a5cee69
-
SHA1
790bb087ee2af366c3898cbbe1e399b7e5267020
-
SHA256
e14f7a5378755a14e44bb1402e254dafa64190f3bc5145c8b4e70ad304ee27a9
-
SHA512
3c5c32db65fdb0dc343dda1f864a161f813aa92f809df55c46eae4b0abb628bea759643a90d6f21c98e8318450316078d076a18ca6babe979414f064231ae6d4
-
SSDEEP
768:0dhO/poiiUcjlJIntn+eP3H9Xqk5nWEZ5SbTDaguI7CPW5u:Ow+jjgnRH9XqcnW85SbT9uIm
Malware Config
Extracted
xenorat
dentiste.zapto.org
system
-
delay
5000
-
install_path
appdata
-
port
7011
-
startup_name
system
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2792-1-0x00000000010A0000-0x00000000010B2000-memory.dmp family_xenorat behavioral1/files/0x0009000000018b05-4.dat family_xenorat behavioral1/memory/2184-10-0x0000000001310000-0x0000000001322000-memory.dmp family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 2184 xeno.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 xeno.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2992 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2184 2792 xeno.exe 29 PID 2792 wrote to memory of 2184 2792 xeno.exe 29 PID 2792 wrote to memory of 2184 2792 xeno.exe 29 PID 2792 wrote to memory of 2184 2792 xeno.exe 29 PID 2184 wrote to memory of 2992 2184 xeno.exe 30 PID 2184 wrote to memory of 2992 2184 xeno.exe 30 PID 2184 wrote to memory of 2992 2184 xeno.exe 30 PID 2184 wrote to memory of 2992 2184 xeno.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\xeno.exe"C:\Users\Admin\AppData\Local\Temp\xeno.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Roaming\XenoManager\xeno.exe"C:\Users\Admin\AppData\Roaming\XenoManager\xeno.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "system" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4D27.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51e78117969f90bf8f7b3c698c5037874
SHA18cf49de603072420bd6f788f59da0ea363a32352
SHA2568ef88e1b240d1bc3b39921b7b4f8fa9bb06d2b8ec2c7e30e62decdb40a309172
SHA512ef8d712fe12aa0e5e3210ca2762e8ebe73f169deed848cb7b5e213b75853708d1bc4ac50b03c473b8cb25cc245e9e4c8ca6257bbaa7b094478e41b6296f50815
-
Filesize
45KB
MD530a770a78bcf9ba6f546fa358a5cee69
SHA1790bb087ee2af366c3898cbbe1e399b7e5267020
SHA256e14f7a5378755a14e44bb1402e254dafa64190f3bc5145c8b4e70ad304ee27a9
SHA5123c5c32db65fdb0dc343dda1f864a161f813aa92f809df55c46eae4b0abb628bea759643a90d6f21c98e8318450316078d076a18ca6babe979414f064231ae6d4