Analysis

  • max time kernel
    1793s
  • max time network
    1164s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-11-2024 21:15

General

  • Target

    sigma f.exe

  • Size

    45KB

  • MD5

    a12827f79269f0447b2754e5a47a4c2e

  • SHA1

    242c6d7451f8561ac57ef212b52b8314bcd2a39d

  • SHA256

    37bd9603cb7c0c74f5db46c0d38108f7b761644cb9f7c465f73d88a9502f8501

  • SHA512

    4d24c294578654d1fd29705209fbdd827e7a429b74997009eae72e3f08472d2471b0b12dca9f51bc956b9b54292dff9f3e042fd12558081e45a1b3386345cd5c

  • SSDEEP

    768:FdhO/poiiUcjlJIngzH9Xqk5nWEZ5SbTDagWI7CPW5N:bw+jjgnCH9XqcnW85SbTpWIl

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    22298

  • startup_name

    bich.bat

Signatures

  • Detect XenoRat Payload 2 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sigma f.exe
    "C:\Users\Admin\AppData\Local\Temp\sigma f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Users\Admin\AppData\Local\Temp\XenoManager\sigma f.exe
      "C:\Users\Admin\AppData\Local\Temp\XenoManager\sigma f.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3168
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "bich.bat" /XML "C:\Users\Admin\AppData\Local\Temp\tmpACE9.tmp" /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\sigma f.exe.log

    Filesize

    226B

    MD5

    1294de804ea5400409324a82fdc7ec59

    SHA1

    9a39506bc6cadf99c1f2129265b610c69d1518f7

    SHA256

    494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0

    SHA512

    033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1

  • C:\Users\Admin\AppData\Local\Temp\XenoManager\sigma f.exe

    Filesize

    45KB

    MD5

    a12827f79269f0447b2754e5a47a4c2e

    SHA1

    242c6d7451f8561ac57ef212b52b8314bcd2a39d

    SHA256

    37bd9603cb7c0c74f5db46c0d38108f7b761644cb9f7c465f73d88a9502f8501

    SHA512

    4d24c294578654d1fd29705209fbdd827e7a429b74997009eae72e3f08472d2471b0b12dca9f51bc956b9b54292dff9f3e042fd12558081e45a1b3386345cd5c

  • C:\Users\Admin\AppData\Local\Temp\tmpACE9.tmp

    Filesize

    1KB

    MD5

    cb996cbe85a5d68fbbef3962a8777459

    SHA1

    1aaa26e112d969d1f1117b822b559c9875bbe0c1

    SHA256

    1aa85f69165cff08ee27b566f94d2d74ac46836905740740d935ef5b57d68985

    SHA512

    7a22654dda48d6c6ea3f36d278f6a93c5320cd8705745a7961c6fef9ba752a174293c7f88249bcfb602d762634220420283164a824351692dc99330dc3d14f76

  • memory/3168-16-0x0000000074870000-0x0000000075021000-memory.dmp

    Filesize

    7.7MB

  • memory/3168-15-0x0000000074870000-0x0000000075021000-memory.dmp

    Filesize

    7.7MB

  • memory/3168-19-0x0000000074870000-0x0000000075021000-memory.dmp

    Filesize

    7.7MB

  • memory/3168-20-0x0000000074870000-0x0000000075021000-memory.dmp

    Filesize

    7.7MB

  • memory/5100-0-0x000000007487E000-0x000000007487F000-memory.dmp

    Filesize

    4KB

  • memory/5100-1-0x0000000000AA0000-0x0000000000AB2000-memory.dmp

    Filesize

    72KB