Analysis
-
max time kernel
288s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 06:47
Behavioral task
behavioral1
Sample
lol.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
lol.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
lol.exe
-
Size
45KB
-
MD5
689b81ff8401ae3e6ee13845116b500b
-
SHA1
270307d2166eea78f26b2a161e3b62b374f2505b
-
SHA256
0e46779462358e8b75bdf29260b966155d8579ef902500d6c9296b01ee929fca
-
SHA512
9795046cdaad8d1c59b3bfa3641518fffc6f0a47a0f82d7b373db00cec6b8a2aca77b75bfff0fed779fb8df39c2ba17aeb1ea1403bf1b6e58a3b4355695836f5
-
SSDEEP
768:RdhO/poiiUcjlJInDTwH9Xqk5nWEZ5SbTDanWI7CPW5p:Pw+jjgnAH9XqcnW85SbTOWIR
Malware Config
Extracted
xenorat
94.228.168.28
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
6666
-
startup_name
svchost
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/464-1-0x00000000000E0000-0x00000000000F2000-memory.dmp family_xenorat behavioral1/files/0x0008000000023cbc-5.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation lol.exe -
Executes dropped EXE 1 IoCs
pid Process 4152 lol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 872 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 464 wrote to memory of 4152 464 lol.exe 86 PID 464 wrote to memory of 4152 464 lol.exe 86 PID 464 wrote to memory of 4152 464 lol.exe 86 PID 4152 wrote to memory of 872 4152 lol.exe 92 PID 4152 wrote to memory of 872 4152 lol.exe 92 PID 4152 wrote to memory of 872 4152 lol.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\lol.exe"C:\Users\Admin\AppData\Local\Temp\lol.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Roaming\XenoManager\lol.exe"C:\Users\Admin\AppData\Roaming\XenoManager\lol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchost" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA577.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD53eea3fc336fee73d11c20900ff024554
SHA193ae74290caf9bf0847ae448834b5cdb4f82c815
SHA25613efae546dbd772e122997a6a75ef700954f9174c419130d6b97611f78a889fe
SHA51247e1f9d0efd160cfd70b5199387287e4bc0d74aa8b662fd48c9c20fc4841448837e88959143a89caefae6eb607e8678c0923db7387a21cecce98bd8588c93fb1
-
Filesize
45KB
MD5689b81ff8401ae3e6ee13845116b500b
SHA1270307d2166eea78f26b2a161e3b62b374f2505b
SHA2560e46779462358e8b75bdf29260b966155d8579ef902500d6c9296b01ee929fca
SHA5129795046cdaad8d1c59b3bfa3641518fffc6f0a47a0f82d7b373db00cec6b8a2aca77b75bfff0fed779fb8df39c2ba17aeb1ea1403bf1b6e58a3b4355695836f5