Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 14:38
Behavioral task
behavioral1
Sample
WindowsCL.exe
Resource
win7-20241010-en
General
-
Target
WindowsCL.exe
-
Size
45KB
-
MD5
79bb9482fad6bd2663b4a57c2924789f
-
SHA1
4c8ac5a4e9812aa3a3f0096b3f0460145c8897eb
-
SHA256
64c3b598e7c704340897c8c69145fcdd4eb80bbfcfa6afe38cebf91db523ecdc
-
SHA512
d2e04f029293b1d0f9157e2e18ae325907d3305f1c7574b968738688cc3b8dd919cc8cd69191408e051aff3b3a1a74fa776192e95bdbeafad1e08b1a2096946e
-
SSDEEP
768:wdhO/poiiUcjlJInTAjH9Xqk5nWEZ5SbTDaGWI7CPW5T:iw+jjgnEjH9XqcnW85SbTfWI7
Malware Config
Extracted
xenorat
198.44.133.84
-
delay
5000
-
install_path
appdata
-
port
13579
-
startup_name
Windows CL
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2592-1-0x00000000008D0000-0x00000000008E2000-memory.dmp family_xenorat behavioral1/files/0x0008000000019394-4.dat family_xenorat behavioral1/memory/2892-9-0x0000000000880000-0x0000000000892000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2892 WindowsCL.exe -
Loads dropped DLL 1 IoCs
pid Process 2592 WindowsCL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsCL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsCL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2880 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2892 2592 WindowsCL.exe 30 PID 2592 wrote to memory of 2892 2592 WindowsCL.exe 30 PID 2592 wrote to memory of 2892 2592 WindowsCL.exe 30 PID 2592 wrote to memory of 2892 2592 WindowsCL.exe 30 PID 2892 wrote to memory of 2880 2892 WindowsCL.exe 31 PID 2892 wrote to memory of 2880 2892 WindowsCL.exe 31 PID 2892 wrote to memory of 2880 2892 WindowsCL.exe 31 PID 2892 wrote to memory of 2880 2892 WindowsCL.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsCL.exe"C:\Users\Admin\AppData\Local\Temp\WindowsCL.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Roaming\XenoManager\WindowsCL.exe"C:\Users\Admin\AppData\Roaming\XenoManager\WindowsCL.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows CL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF1BE.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c3e5a1418a396df59a6dae236e83f4c8
SHA1d2441292e2bd087f9972b8b6a49dd0085d9fbf42
SHA2561658e9e5587788ed9fdb6fddf28643fc7fa5c247fead977acd169d71f2ad77bc
SHA512651825d2dbfc435dcbbb515591bf695e02ce8e45c1a6e90fd73a8df1cae67354130f489b4682c5c5b6b0a337dec0effd98158b94d5865c3a2338f83d5488d29c
-
Filesize
45KB
MD579bb9482fad6bd2663b4a57c2924789f
SHA14c8ac5a4e9812aa3a3f0096b3f0460145c8897eb
SHA25664c3b598e7c704340897c8c69145fcdd4eb80bbfcfa6afe38cebf91db523ecdc
SHA512d2e04f029293b1d0f9157e2e18ae325907d3305f1c7574b968738688cc3b8dd919cc8cd69191408e051aff3b3a1a74fa776192e95bdbeafad1e08b1a2096946e