Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 14:33
Behavioral task
behavioral1
Sample
Windows CL.exe
Resource
win7-20240708-en
General
-
Target
Windows CL.exe
-
Size
45KB
-
MD5
79bb9482fad6bd2663b4a57c2924789f
-
SHA1
4c8ac5a4e9812aa3a3f0096b3f0460145c8897eb
-
SHA256
64c3b598e7c704340897c8c69145fcdd4eb80bbfcfa6afe38cebf91db523ecdc
-
SHA512
d2e04f029293b1d0f9157e2e18ae325907d3305f1c7574b968738688cc3b8dd919cc8cd69191408e051aff3b3a1a74fa776192e95bdbeafad1e08b1a2096946e
-
SSDEEP
768:wdhO/poiiUcjlJInTAjH9Xqk5nWEZ5SbTDaGWI7CPW5T:iw+jjgnEjH9XqcnW85SbTfWI7
Malware Config
Extracted
xenorat
198.44.133.84
-
delay
5000
-
install_path
appdata
-
port
13579
-
startup_name
Windows CL
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/4892-1-0x00000000000C0000-0x00000000000D2000-memory.dmp family_xenorat behavioral2/files/0x0008000000023c8c-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Windows CL.exe -
Executes dropped EXE 1 IoCs
pid Process 5096 Windows CL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows CL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows CL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3660 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4892 wrote to memory of 5096 4892 Windows CL.exe 83 PID 4892 wrote to memory of 5096 4892 Windows CL.exe 83 PID 4892 wrote to memory of 5096 4892 Windows CL.exe 83 PID 5096 wrote to memory of 3660 5096 Windows CL.exe 86 PID 5096 wrote to memory of 3660 5096 Windows CL.exe 86 PID 5096 wrote to memory of 3660 5096 Windows CL.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows CL.exe"C:\Users\Admin\AppData\Local\Temp\Windows CL.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Roaming\XenoManager\Windows CL.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Windows CL.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows CL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpED3E.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5fe297e871e04f8801c450ec83946123c
SHA18bcba48fc469007054203c27b6114039fe861fb0
SHA25612528066723989eef7a909c2bc26e056c0895dab03b751de1afae0cce09ebee5
SHA51218ac05868eb6f1e009098fb684298ac6ce61987fc3f759774bcdba40cbe3ea10c538ff8878f5d59797597e4ff156c546a20adf40f95c8f8239fa6527663225cd
-
Filesize
45KB
MD579bb9482fad6bd2663b4a57c2924789f
SHA14c8ac5a4e9812aa3a3f0096b3f0460145c8897eb
SHA25664c3b598e7c704340897c8c69145fcdd4eb80bbfcfa6afe38cebf91db523ecdc
SHA512d2e04f029293b1d0f9157e2e18ae325907d3305f1c7574b968738688cc3b8dd919cc8cd69191408e051aff3b3a1a74fa776192e95bdbeafad1e08b1a2096946e