Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 19:13

General

  • Target

    639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe

  • Size

    173KB

  • MD5

    94a7e3859c2e4238421cdfe73d49603c

  • SHA1

    03f03c5b5d8cf362aa52b9e793e7be398d779c21

  • SHA256

    639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91

  • SHA512

    74048463606f7017bd8bd3c92773edde5a406247c5ea437b8ee580a3d9e65eb755aa44de466fc2aabef8b9a67c40163afeb3df9bc9fb35f8afe20814d5de85b5

  • SSDEEP

    3072:/Qv8/m8hRr4ZWmhtRGKTCaWzUp0jxrZmHM26XF1g39JZY6Rd:/k83r4MmhvGKTpa1tXUJLd

Malware Config

Extracted

Family

xenorat

C2

dns.stipamana.com

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    12000

  • install_path

    appdata

  • port

    4567

  • startup_name

    mrec

Signatures

  • Detect XenoRat Payload 3 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
    "C:\Users\Admin\AppData\Local\Temp\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
      C:\Users\Admin\AppData\Local\Temp\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
      2⤵
        PID:2692
      • C:\Users\Admin\AppData\Local\Temp\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
        C:\Users\Admin\AppData\Local\Temp\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Users\Admin\AppData\Roaming\UpdateManager\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
          "C:\Users\Admin\AppData\Roaming\UpdateManager\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2892
          • C:\Users\Admin\AppData\Roaming\UpdateManager\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
            C:\Users\Admin\AppData\Roaming\UpdateManager\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2176
          • C:\Users\Admin\AppData\Roaming\UpdateManager\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
            C:\Users\Admin\AppData\Roaming\UpdateManager\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2880
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks.exe" /Create /TN "mrec" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBAA8.tmp" /F
              5⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:3056
          • C:\Users\Admin\AppData\Roaming\UpdateManager\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
            C:\Users\Admin\AppData\Roaming\UpdateManager\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2812
      • C:\Users\Admin\AppData\Local\Temp\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
        C:\Users\Admin\AppData\Local\Temp\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe
        2⤵
          PID:2164

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpBAA8.tmp

        Filesize

        1KB

        MD5

        7da4ee9653331bae15216543cec5de6e

        SHA1

        9650b08bacaae98d38b3f983ffa68e69764ae9f3

        SHA256

        8726d6b1a132824b956ae6b5474f3c40937e681c2b7d8fb61026199dd1183fdc

        SHA512

        226af65b56181476da3f70271260d2c9a2585dbb4e5611f3a1ad04b053b9f7008d656ff4dd395c0a7c18e2eb347e4157be67475fd06297841b02b044add7d64b

      • C:\Users\Admin\AppData\Roaming\UpdateManager\639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91.exe

        Filesize

        173KB

        MD5

        94a7e3859c2e4238421cdfe73d49603c

        SHA1

        03f03c5b5d8cf362aa52b9e793e7be398d779c21

        SHA256

        639135eb69333aba7ecb762072d8bef1d2db83e54edbe627dd223039142b8c91

        SHA512

        74048463606f7017bd8bd3c92773edde5a406247c5ea437b8ee580a3d9e65eb755aa44de466fc2aabef8b9a67c40163afeb3df9bc9fb35f8afe20814d5de85b5

      • memory/2060-8-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2060-22-0x0000000074690000-0x0000000074D7E000-memory.dmp

        Filesize

        6.9MB

      • memory/2060-15-0x0000000074690000-0x0000000074D7E000-memory.dmp

        Filesize

        6.9MB

      • memory/2060-12-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2060-6-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2696-3-0x0000000000240000-0x0000000000274000-memory.dmp

        Filesize

        208KB

      • memory/2696-11-0x0000000074690000-0x0000000074D7E000-memory.dmp

        Filesize

        6.9MB

      • memory/2696-4-0x00000000002C0000-0x00000000002C6000-memory.dmp

        Filesize

        24KB

      • memory/2696-16-0x0000000074690000-0x0000000074D7E000-memory.dmp

        Filesize

        6.9MB

      • memory/2696-0-0x000000007469E000-0x000000007469F000-memory.dmp

        Filesize

        4KB

      • memory/2696-2-0x00000000001F0000-0x00000000001F6000-memory.dmp

        Filesize

        24KB

      • memory/2696-1-0x0000000000130000-0x0000000000160000-memory.dmp

        Filesize

        192KB

      • memory/2892-24-0x00000000010C0000-0x00000000010F0000-memory.dmp

        Filesize

        192KB