Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2024 08:40

General

  • Target

    xeno.exe

  • Size

    48KB

  • MD5

    f51599aed8311992d1672b87c93965b4

  • SHA1

    0701bde963fe0540fd46ca05062445d085071250

  • SHA256

    ef1ba25a2e21e5340922c4b7755c937d3ff3064479b12618cab9f38d8220fce6

  • SHA512

    7fdd3398fe307670396cd274e9ccc1967b263e566d46847b7effc14290c72602cb3f411845fdc7386fd852b9c4e7f8ac8fcd068de9d9ef7f3d2a738adcd6f69b

  • SSDEEP

    768:GdhO/poiiUcjlJIne3H9Xqk5nWEZ5SbTDaCuI7CPW5rfFwcD:ww+jjgnQH9XqcnW85SbTvuIDfWC

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    Xeno

Signatures

  • Detect XenoRat Payload 1 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xeno.exe
    "C:\Users\Admin\AppData\Local\Temp\xeno.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /Create /TN "Xeno" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE003.tmp" /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpE003.tmp

    Filesize

    1KB

    MD5

    a987cadb2c6528f0c32ca5d706af9b38

    SHA1

    c162568b4635a14ae94cca913fd0c662266e8ad5

    SHA256

    1c66f094caa60af6b816dc7237be4ee25b34203bf8c586c552c212a3c571d665

    SHA512

    9c64ecb82466bc681f36cde2389e2d887acc8af00b484d4c4ccec429a85ab5f945db3651c0c38ad63ddeb92db5c068f40a723e8ef516d45950270bf3ddfb4018

  • memory/1824-0-0x00000000748CE000-0x00000000748CF000-memory.dmp

    Filesize

    4KB

  • memory/1824-1-0x0000000000C40000-0x0000000000C52000-memory.dmp

    Filesize

    72KB

  • memory/1824-4-0x00000000748C0000-0x0000000074FAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1824-5-0x00000000748CE000-0x00000000748CF000-memory.dmp

    Filesize

    4KB

  • memory/1824-6-0x00000000748C0000-0x0000000074FAE000-memory.dmp

    Filesize

    6.9MB