Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2024, 08:56 UTC

General

  • Target

    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe

  • Size

    285KB

  • MD5

    d0ddfcddb1269b9e2edb00cd7edae575

  • SHA1

    2dc7c44b3e204f863f78b81d08fc73806137ad33

  • SHA256

    469aeffa2304a243bfa555589979bb3ccdb19f75842873805e7f522f15a87426

  • SHA512

    8f507f027717426a91e0e766c0d441881faa120d2950bad90b40fa9fe18158369a5e97510357cc09c9ab1ea98903142acca1d783b40536f85332e7bd6e7b44b1

  • SSDEEP

    6144:+5tgf4emOsrVHWfrhV+YKFOWr157wugSzX0Yo8PI:+MwhUfrhV+YKYWr157wugSzX0Yov

Malware Config

Extracted

Family

xenorat

C2

87.120.116.115

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    50000

  • install_path

    appdata

  • port

    1391

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 3 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    "C:\Users\Admin\AppData\Local\Temp\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
      C:\Users\Admin\AppData\Local\Temp\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "UpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8EB8.tmp" /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2276
    • C:\Users\Admin\AppData\Local\Temp\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
      C:\Users\Admin\AppData\Local\Temp\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Roaming\UpdateManager\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
        "C:\Users\Admin\AppData\Roaming\UpdateManager\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:376
        • C:\Users\Admin\AppData\Roaming\UpdateManager\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
          C:\Users\Admin\AppData\Roaming\UpdateManager\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2812
        • C:\Users\Admin\AppData\Roaming\UpdateManager\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
          C:\Users\Admin\AppData\Roaming\UpdateManager\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
          4⤵
          • Executes dropped EXE
          PID:2732

Network

    No results found
  • 87.120.116.115:1391
    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    152 B
    120 B
    3
    3
  • 87.120.116.115:1391
    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    152 B
    120 B
    3
    3
  • 87.120.116.115:1391
    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    152 B
    120 B
    3
    3
  • 87.120.116.115:1391
    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    152 B
    120 B
    3
    3
  • 87.120.116.115:1391
    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    152 B
    120 B
    3
    3
  • 87.120.116.115:1391
    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    152 B
    120 B
    3
    3
  • 87.120.116.115:1391
    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    152 B
    120 B
    3
    3
  • 87.120.116.115:1391
    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    152 B
    120 B
    3
    3
  • 87.120.116.115:1391
    D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe
    152 B
    120 B
    3
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp8EB8.tmp

    Filesize

    1KB

    MD5

    fee217ab3ead6c0a15c65495941e7ea6

    SHA1

    3dac6cdcc01b5075ea65f99704702720edd7e5d7

    SHA256

    acc2271c91c91e663f66fb12a9e7c4196bf031609a3c81f492ece61ae25c8dc2

    SHA512

    3c7241ae83dcaf5ee0a98d5719c4b5c1021b03c8a720ada68c9a53c9d8aba722b18e8598b0eda31a563d1cd7c8e33b7aca141c7bf6454f98d71e05855c99e1d6

  • \Users\Admin\AppData\Roaming\UpdateManager\D0DDFCDDB1269B9E2EDB00CD7EDAE575.exe

    Filesize

    285KB

    MD5

    d0ddfcddb1269b9e2edb00cd7edae575

    SHA1

    2dc7c44b3e204f863f78b81d08fc73806137ad33

    SHA256

    469aeffa2304a243bfa555589979bb3ccdb19f75842873805e7f522f15a87426

    SHA512

    8f507f027717426a91e0e766c0d441881faa120d2950bad90b40fa9fe18158369a5e97510357cc09c9ab1ea98903142acca1d783b40536f85332e7bd6e7b44b1

  • memory/376-26-0x0000000000420000-0x0000000000444000-memory.dmp

    Filesize

    144KB

  • memory/376-25-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/2016-1-0x0000000001100000-0x000000000114E000-memory.dmp

    Filesize

    312KB

  • memory/2016-2-0x0000000000380000-0x00000000003A4000-memory.dmp

    Filesize

    144KB

  • memory/2016-3-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2016-21-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2016-0-0x0000000074ACE000-0x0000000074ACF000-memory.dmp

    Filesize

    4KB

  • memory/2332-16-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2332-24-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2484-15-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2484-5-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2484-6-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2484-33-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2484-8-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2484-36-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2484-37-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.