Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240903-en
General
-
Target
test.exe
-
Size
163KB
-
MD5
4531671a39dfdd4a9711e64400f7f0fa
-
SHA1
55357cd9c957105f9b5af04f1a8e65101229ae4a
-
SHA256
76c45fabe4e4438e1d9d434e9cd104219fc7e855b90bafaf52b70c069a495b65
-
SHA512
d35d54d6986dfbe22fcac76792853cacdc1c4b0eecba5cd7703c3b1f50005d42b8e36ccc6a8c5a4928d2c49413896e11779f4e23357b7229b0863511f5ab3f52
-
SSDEEP
3072:O6kZB/A8p+F3sh+3NB/fXdBcRDmGCKX+Ip4rI4gei6+SRaBwV0BfI6Ks2:hkZB/A8p+F2+3b/fXdKcLKXhG84geVoP
Malware Config
Extracted
xenorat
10.160.192.195
-
delay
5000
-
install_path
appdata
-
port
13579
-
startup_name
Windows CL
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/files/0x000f000000018683-7.dat family_xenorat behavioral1/memory/2512-10-0x0000000000AA0000-0x0000000000AB2000-memory.dmp family_xenorat -
Xenorat family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test.exe test.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test.exe test.exe -
Executes dropped EXE 1 IoCs
pid Process 2512 tempfile -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tempfile Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2068 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2512 2236 test.exe 31 PID 2236 wrote to memory of 2512 2236 test.exe 31 PID 2236 wrote to memory of 2512 2236 test.exe 31 PID 2236 wrote to memory of 2512 2236 test.exe 31 PID 2512 wrote to memory of 2068 2512 tempfile 32 PID 2512 wrote to memory of 2068 2512 tempfile 32 PID 2512 wrote to memory of 2068 2512 tempfile 32 PID 2512 wrote to memory of 2068 2512 tempfile 32 PID 2512 wrote to memory of 2068 2512 tempfile 32 PID 2512 wrote to memory of 2068 2512 tempfile 32 PID 2512 wrote to memory of 2068 2512 tempfile 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\tempfile"C:\Users\Admin\AppData\Local\Temp\tempfile"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\XenoManager\tempfile3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD52be6e608f41c752b6d4d00ee65d3a4dd
SHA119d4f38a8c86f29b1fdd43dfbd98c3ad3192ceff
SHA256481de496a0d953c431a161f7929cabb72817c48d287951e85b76fb1e50529a60
SHA512b725d3f02658b2033f75e7dc364118c865ce6a48b07acba80e4be54083f09dad6d42d68fd186010b21ce92c3118f9150787d40900b5443f990c6caf6a1d9bd8d