Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 08:40
Behavioral task
behavioral1
Sample
xeno.exe
Resource
win7-20241010-en
General
-
Target
xeno.exe
-
Size
48KB
-
MD5
f51599aed8311992d1672b87c93965b4
-
SHA1
0701bde963fe0540fd46ca05062445d085071250
-
SHA256
ef1ba25a2e21e5340922c4b7755c937d3ff3064479b12618cab9f38d8220fce6
-
SHA512
7fdd3398fe307670396cd274e9ccc1967b263e566d46847b7effc14290c72602cb3f411845fdc7386fd852b9c4e7f8ac8fcd068de9d9ef7f3d2a738adcd6f69b
-
SSDEEP
768:GdhO/poiiUcjlJIne3H9Xqk5nWEZ5SbTDaCuI7CPW5rfFwcD:ww+jjgnQH9XqcnW85SbTvuIDfWC
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
Xeno
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral2/memory/3016-1-0x0000000000270000-0x0000000000282000-memory.dmp family_xenorat -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4600 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 4600 3016 xeno.exe 91 PID 3016 wrote to memory of 4600 3016 xeno.exe 91 PID 3016 wrote to memory of 4600 3016 xeno.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\xeno.exe"C:\Users\Admin\AppData\Local\Temp\xeno.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Xeno" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB1FA.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4600
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a987cadb2c6528f0c32ca5d706af9b38
SHA1c162568b4635a14ae94cca913fd0c662266e8ad5
SHA2561c66f094caa60af6b816dc7237be4ee25b34203bf8c586c552c212a3c571d665
SHA5129c64ecb82466bc681f36cde2389e2d887acc8af00b484d4c4ccec429a85ab5f945db3651c0c38ad63ddeb92db5c068f40a723e8ef516d45950270bf3ddfb4018