Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 05:41

General

  • Target

    7ea9da3dd3db6f3fadf04ac76b54434b.doc

  • Size

    195KB

  • MD5

    7ea9da3dd3db6f3fadf04ac76b54434b

  • SHA1

    b30b950191046d999e71aaa54fb2648c6655ce9b

  • SHA256

    947bce97211371e730a2b8b79c2ec4d154904e8faa7bed2583c5c6c420230170

  • SHA512

    f94eb382dedb8c3952dbc0f3b9040201455cec641c845bedf5765a2772aa98cb20d92b3e0edadcd92fd7cdb77e7c6f37d26bdd276cceea733237e28f04240f9d

  • SSDEEP

    3072:a877VGZ5Sd3b4e0wNZtsqXNKd5AvDJW4S+I/tZ6X1bpF6mfTm:DGZYwAZHMCDJ8/u5pAmbm

Malware Config

Extracted

Family

xenorat

C2

dns.stipamana.com

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    12000

  • install_path

    appdata

  • port

    4567

  • startup_name

    mrec

Signatures

  • Detect XenoRat Payload 3 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7ea9da3dd3db6f3fadf04ac76b54434b.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
          "C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:756
          • C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2888
          • C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1164
          • C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            5⤵
            • Executes dropped EXE
            PID:1372
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        3⤵
        • Executes dropped EXE
        PID:2644
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1816
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\Admin\AppData\Local\Temp\tmp82B.tmp" /F
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1860
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp82B.tmp

      Filesize

      1KB

      MD5

      dabe93a03c5560ab1670cf79b8d28566

      SHA1

      69738fe43d4550ece028ff2795a54bbad0985414

      SHA256

      743e8b28a38e98ea27ef07f17b7529976979c7b01eab92586a6cb686c0d1f68d

      SHA512

      15b3b49c46901e00a73def834225df28fd843af1e9ae594c7d061406209f6ce57277673c9c1ae3ed541f989fa499fd3e88929e00ebded6d23301f8d3680a6c57

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe

      Filesize

      173KB

      MD5

      94a7e3859c2e4238421cdfe73d49603c

      SHA1

      03f03c5b5d8cf362aa52b9e793e7be398d779c21

      SHA256

      639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91

      SHA512

      74048463606f7017bd8bd3c92773edde5a406247c5ea437b8ee580a3d9e65eb755aa44de466fc2aabef8b9a67c40163afeb3df9bc9fb35f8afe20814d5de85b5

    • memory/756-83-0x00000000001E0000-0x0000000000210000-memory.dmp

      Filesize

      192KB

    • memory/1792-67-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1792-69-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1792-65-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2364-29-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-25-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-19-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-18-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-17-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-15-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-14-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-12-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-11-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-9-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-8-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-7-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-6-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-4-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-27-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-30-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-0-0x000000002F0C1000-0x000000002F0C2000-memory.dmp

      Filesize

      4KB

    • memory/2364-28-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-23-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-20-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-26-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-22-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-21-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-24-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-13-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2364-101-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-100-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-99-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-10-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-16-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-5-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-2-0x000000007140D000-0x0000000071418000-memory.dmp

      Filesize

      44KB

    • memory/2364-94-0x000000007140D000-0x0000000071418000-memory.dmp

      Filesize

      44KB

    • memory/3056-64-0x0000000000250000-0x0000000000256000-memory.dmp

      Filesize

      24KB

    • memory/3056-63-0x0000000000500000-0x0000000000534000-memory.dmp

      Filesize

      208KB

    • memory/3056-62-0x0000000000230000-0x0000000000236000-memory.dmp

      Filesize

      24KB

    • memory/3056-61-0x0000000000260000-0x0000000000290000-memory.dmp

      Filesize

      192KB