Analysis
-
max time kernel
289s -
max time network
304s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02-11-2024 06:47
Behavioral task
behavioral1
Sample
lol.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
lol.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
lol.exe
-
Size
45KB
-
MD5
689b81ff8401ae3e6ee13845116b500b
-
SHA1
270307d2166eea78f26b2a161e3b62b374f2505b
-
SHA256
0e46779462358e8b75bdf29260b966155d8579ef902500d6c9296b01ee929fca
-
SHA512
9795046cdaad8d1c59b3bfa3641518fffc6f0a47a0f82d7b373db00cec6b8a2aca77b75bfff0fed779fb8df39c2ba17aeb1ea1403bf1b6e58a3b4355695836f5
-
SSDEEP
768:RdhO/poiiUcjlJInDTwH9Xqk5nWEZ5SbTDanWI7CPW5p:Pw+jjgnAH9XqcnW85SbTOWIR
Malware Config
Extracted
xenorat
94.228.168.28
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
6666
-
startup_name
svchost
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/1512-1-0x00000000000D0000-0x00000000000E2000-memory.dmp family_xenorat behavioral2/files/0x002800000004516d-2.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation lol.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 lol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1764 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2240 1512 lol.exe 82 PID 1512 wrote to memory of 2240 1512 lol.exe 82 PID 1512 wrote to memory of 2240 1512 lol.exe 82 PID 2240 wrote to memory of 1764 2240 lol.exe 88 PID 2240 wrote to memory of 1764 2240 lol.exe 88 PID 2240 wrote to memory of 1764 2240 lol.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\lol.exe"C:\Users\Admin\AppData\Local\Temp\lol.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\XenoManager\lol.exe"C:\Users\Admin\AppData\Roaming\XenoManager\lol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchost" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAA78.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD566aea5e724c4a224d092067c3381783b
SHA1ee3cc64c4370a255391bdfeef2883d5b7a6e6230
SHA25604b17cab961f973464bba8924f764edef6451d1774f2405d27ef33d164296923
SHA5125d719e303f491d1443cb7c7e8946481e90532522a422c98f82466e1eddcd1ef24a4505dcbf75f2191fbb66825d3550566d7f408a3854edeb4c1a192c8c9a6d06
-
Filesize
1KB
MD53eea3fc336fee73d11c20900ff024554
SHA193ae74290caf9bf0847ae448834b5cdb4f82c815
SHA25613efae546dbd772e122997a6a75ef700954f9174c419130d6b97611f78a889fe
SHA51247e1f9d0efd160cfd70b5199387287e4bc0d74aa8b662fd48c9c20fc4841448837e88959143a89caefae6eb607e8678c0923db7387a21cecce98bd8588c93fb1
-
Filesize
45KB
MD5689b81ff8401ae3e6ee13845116b500b
SHA1270307d2166eea78f26b2a161e3b62b374f2505b
SHA2560e46779462358e8b75bdf29260b966155d8579ef902500d6c9296b01ee929fca
SHA5129795046cdaad8d1c59b3bfa3641518fffc6f0a47a0f82d7b373db00cec6b8a2aca77b75bfff0fed779fb8df39c2ba17aeb1ea1403bf1b6e58a3b4355695836f5