Analysis
-
max time kernel
288s -
max time network
297s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-11-2024 06:47
Behavioral task
behavioral1
Sample
lol.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
lol.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
lol.exe
-
Size
45KB
-
MD5
689b81ff8401ae3e6ee13845116b500b
-
SHA1
270307d2166eea78f26b2a161e3b62b374f2505b
-
SHA256
0e46779462358e8b75bdf29260b966155d8579ef902500d6c9296b01ee929fca
-
SHA512
9795046cdaad8d1c59b3bfa3641518fffc6f0a47a0f82d7b373db00cec6b8a2aca77b75bfff0fed779fb8df39c2ba17aeb1ea1403bf1b6e58a3b4355695836f5
-
SSDEEP
768:RdhO/poiiUcjlJInDTwH9Xqk5nWEZ5SbTDanWI7CPW5p:Pw+jjgnAH9XqcnW85SbTOWIR
Malware Config
Extracted
xenorat
94.228.168.28
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
6666
-
startup_name
svchost
Signatures
-
Detect XenoRat Payload 2 IoCs
Processes:
resource yara_rule behavioral3/memory/4092-1-0x0000000000B20000-0x0000000000B32000-memory.dmp family_xenorat C:\Users\Admin\AppData\Roaming\XenoManager\lol.exe family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
Processes:
lol.exepid process 4892 lol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lol.exelol.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
lol.exelol.exedescription pid process target process PID 4092 wrote to memory of 4892 4092 lol.exe lol.exe PID 4092 wrote to memory of 4892 4092 lol.exe lol.exe PID 4092 wrote to memory of 4892 4092 lol.exe lol.exe PID 4892 wrote to memory of 2688 4892 lol.exe schtasks.exe PID 4892 wrote to memory of 2688 4892 lol.exe schtasks.exe PID 4892 wrote to memory of 2688 4892 lol.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\lol.exe"C:\Users\Admin\AppData\Local\Temp\lol.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Roaming\XenoManager\lol.exe"C:\Users\Admin\AppData\Roaming\XenoManager\lol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchost" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB18D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
1KB
MD53eea3fc336fee73d11c20900ff024554
SHA193ae74290caf9bf0847ae448834b5cdb4f82c815
SHA25613efae546dbd772e122997a6a75ef700954f9174c419130d6b97611f78a889fe
SHA51247e1f9d0efd160cfd70b5199387287e4bc0d74aa8b662fd48c9c20fc4841448837e88959143a89caefae6eb607e8678c0923db7387a21cecce98bd8588c93fb1
-
Filesize
45KB
MD5689b81ff8401ae3e6ee13845116b500b
SHA1270307d2166eea78f26b2a161e3b62b374f2505b
SHA2560e46779462358e8b75bdf29260b966155d8579ef902500d6c9296b01ee929fca
SHA5129795046cdaad8d1c59b3bfa3641518fffc6f0a47a0f82d7b373db00cec6b8a2aca77b75bfff0fed779fb8df39c2ba17aeb1ea1403bf1b6e58a3b4355695836f5