Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-10-2024 19:35
General
-
Target
something.exe
-
Size
45KB
-
MD5
2755eec715f4be9c61e964bf57d75c80
-
SHA1
638afd519332a470e6a4a63abf9df3ca65787f9d
-
SHA256
07c1bf391c3054918d6843413a6c8e5cd62d7479173565708db41c97a2a0212d
-
SHA512
ea70723cb1ce760c8e24f067382cd6a6f64894a5de597f349913454a6c41c28516279c6e89dadaae1f748b39d72b821d5f77b3425f735a0f2cad7c26007527a7
-
SSDEEP
768:FdhO/poiiUcjlJInwVH9Xqk5nWEZ5SbTDazuI7CPW5N:bw+jjgn4H9XqcnW85SbTuuIl
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
6932
-
startup_name
SYSTEM
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/4924-1-0x0000000000D00000-0x0000000000D12000-memory.dmp family_xenorat behavioral1/files/0x000800000001ac16-5.dat family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 960 something.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language something.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language something.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 924 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4924 wrote to memory of 960 4924 something.exe 74 PID 4924 wrote to memory of 960 4924 something.exe 74 PID 4924 wrote to memory of 960 4924 something.exe 74 PID 960 wrote to memory of 924 960 something.exe 75 PID 960 wrote to memory of 924 960 something.exe 75 PID 960 wrote to memory of 924 960 something.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\something.exe"C:\Users\Admin\AppData\Local\Temp\something.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Roaming\XenoManager\something.exe"C:\Users\Admin\AppData\Roaming\XenoManager\something.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "SYSTEM" /XML "C:\Users\Admin\AppData\Local\Temp\tmp731D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
1KB
MD59b4081412ecbcdc23a84a35755d4c798
SHA12d2dd6f3187f4c1559add7da5965be481f6cf91d
SHA25611513abcfce862a20d8e67ca88a3ae0d44d05d2a74faddb5e4b8b7012325a6e8
SHA512494fb04f64966b4d18f13b3b4897d15192b91f015abc1c373ca59b25cc437eda53c9f5c8659c7698286c380c9cf900520ff93eb9b6b2afbae3b073f8303eeca1
-
Filesize
45KB
MD52755eec715f4be9c61e964bf57d75c80
SHA1638afd519332a470e6a4a63abf9df3ca65787f9d
SHA25607c1bf391c3054918d6843413a6c8e5cd62d7479173565708db41c97a2a0212d
SHA512ea70723cb1ce760c8e24f067382cd6a6f64894a5de597f349913454a6c41c28516279c6e89dadaae1f748b39d72b821d5f77b3425f735a0f2cad7c26007527a7