Analysis
-
max time kernel
133s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 14:38
Behavioral task
behavioral1
Sample
WindowsCL.exe
Resource
win7-20241010-en
General
-
Target
WindowsCL.exe
-
Size
45KB
-
MD5
79bb9482fad6bd2663b4a57c2924789f
-
SHA1
4c8ac5a4e9812aa3a3f0096b3f0460145c8897eb
-
SHA256
64c3b598e7c704340897c8c69145fcdd4eb80bbfcfa6afe38cebf91db523ecdc
-
SHA512
d2e04f029293b1d0f9157e2e18ae325907d3305f1c7574b968738688cc3b8dd919cc8cd69191408e051aff3b3a1a74fa776192e95bdbeafad1e08b1a2096946e
-
SSDEEP
768:wdhO/poiiUcjlJInTAjH9Xqk5nWEZ5SbTDaGWI7CPW5T:iw+jjgnEjH9XqcnW85SbTfWI7
Malware Config
Extracted
xenorat
198.44.133.84
-
delay
5000
-
install_path
appdata
-
port
13579
-
startup_name
Windows CL
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3824-1-0x00000000000C0000-0x00000000000D2000-memory.dmp family_xenorat behavioral2/files/0x000b000000023bab-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WindowsCL.exe -
Executes dropped EXE 1 IoCs
pid Process 868 WindowsCL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsCL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsCL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 460 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3824 wrote to memory of 868 3824 WindowsCL.exe 83 PID 3824 wrote to memory of 868 3824 WindowsCL.exe 83 PID 3824 wrote to memory of 868 3824 WindowsCL.exe 83 PID 868 wrote to memory of 460 868 WindowsCL.exe 87 PID 868 wrote to memory of 460 868 WindowsCL.exe 87 PID 868 wrote to memory of 460 868 WindowsCL.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsCL.exe"C:\Users\Admin\AppData\Local\Temp\WindowsCL.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Roaming\XenoManager\WindowsCL.exe"C:\Users\Admin\AppData\Roaming\XenoManager\WindowsCL.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows CL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAB05.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5c3e5a1418a396df59a6dae236e83f4c8
SHA1d2441292e2bd087f9972b8b6a49dd0085d9fbf42
SHA2561658e9e5587788ed9fdb6fddf28643fc7fa5c247fead977acd169d71f2ad77bc
SHA512651825d2dbfc435dcbbb515591bf695e02ce8e45c1a6e90fd73a8df1cae67354130f489b4682c5c5b6b0a337dec0effd98158b94d5865c3a2338f83d5488d29c
-
Filesize
45KB
MD579bb9482fad6bd2663b4a57c2924789f
SHA14c8ac5a4e9812aa3a3f0096b3f0460145c8897eb
SHA25664c3b598e7c704340897c8c69145fcdd4eb80bbfcfa6afe38cebf91db523ecdc
SHA512d2e04f029293b1d0f9157e2e18ae325907d3305f1c7574b968738688cc3b8dd919cc8cd69191408e051aff3b3a1a74fa776192e95bdbeafad1e08b1a2096946e