Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 05:44

General

  • Target

    7ea9da3dd3db6f3fadf04ac76b54434b.doc

  • Size

    195KB

  • MD5

    7ea9da3dd3db6f3fadf04ac76b54434b

  • SHA1

    b30b950191046d999e71aaa54fb2648c6655ce9b

  • SHA256

    947bce97211371e730a2b8b79c2ec4d154904e8faa7bed2583c5c6c420230170

  • SHA512

    f94eb382dedb8c3952dbc0f3b9040201455cec641c845bedf5765a2772aa98cb20d92b3e0edadcd92fd7cdb77e7c6f37d26bdd276cceea733237e28f04240f9d

  • SSDEEP

    3072:a877VGZ5Sd3b4e0wNZtsqXNKd5AvDJW4S+I/tZ6X1bpF6mfTm:DGZYwAZHMCDJ8/u5pAmbm

Malware Config

Extracted

Family

xenorat

C2

dns.stipamana.com

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    12000

  • install_path

    appdata

  • port

    4567

  • startup_name

    mrec

Signatures

  • Detect XenoRat Payload 3 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7ea9da3dd3db6f3fadf04ac76b54434b.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:316
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE8BA.tmp" /F
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2160
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1908
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
          "C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1916
          • C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:684
          • C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2576
          • C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            C:\Users\Admin\AppData\Roaming\UpdateManager\GFKMTE.exe
            5⤵
            • Executes dropped EXE
            PID:2304
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpE8BA.tmp

      Filesize

      1KB

      MD5

      dabe93a03c5560ab1670cf79b8d28566

      SHA1

      69738fe43d4550ece028ff2795a54bbad0985414

      SHA256

      743e8b28a38e98ea27ef07f17b7529976979c7b01eab92586a6cb686c0d1f68d

      SHA512

      15b3b49c46901e00a73def834225df28fd843af1e9ae594c7d061406209f6ce57277673c9c1ae3ed541f989fa499fd3e88929e00ebded6d23301f8d3680a6c57

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\GFKMTE.exe

      Filesize

      173KB

      MD5

      94a7e3859c2e4238421cdfe73d49603c

      SHA1

      03f03c5b5d8cf362aa52b9e793e7be398d779c21

      SHA256

      639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91

      SHA512

      74048463606f7017bd8bd3c92773edde5a406247c5ea437b8ee580a3d9e65eb755aa44de466fc2aabef8b9a67c40163afeb3df9bc9fb35f8afe20814d5de85b5

    • memory/316-68-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/316-66-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/316-64-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1916-85-0x0000000000430000-0x0000000000464000-memory.dmp

      Filesize

      208KB

    • memory/1916-84-0x00000000010E0000-0x0000000001110000-memory.dmp

      Filesize

      192KB

    • memory/2324-63-0x00000000003E0000-0x00000000003E6000-memory.dmp

      Filesize

      24KB

    • memory/2324-62-0x00000000004D0000-0x0000000000504000-memory.dmp

      Filesize

      208KB

    • memory/2324-61-0x00000000003C0000-0x00000000003C6000-memory.dmp

      Filesize

      24KB

    • memory/2324-60-0x0000000000920000-0x0000000000950000-memory.dmp

      Filesize

      192KB

    • memory/2372-23-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-4-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-20-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-19-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-18-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-15-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-14-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-13-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-12-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-11-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-10-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-9-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-8-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-7-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-6-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-21-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-17-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-22-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-0-0x000000002F411000-0x000000002F412000-memory.dmp

      Filesize

      4KB

    • memory/2372-24-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-25-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-26-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-29-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-27-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-28-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-5-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-2-0x0000000070E0D000-0x0000000070E18000-memory.dmp

      Filesize

      44KB

    • memory/2372-96-0x0000000070E0D000-0x0000000070E18000-memory.dmp

      Filesize

      44KB

    • memory/2372-97-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-98-0x0000000000770000-0x0000000000870000-memory.dmp

      Filesize

      1024KB

    • memory/2372-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB