Overview
overview
10Static
static
10Release.zip
windows10-2004-x64
7plugins/Chat.dll
windows10-2004-x64
1plugins/Fi...er.dll
windows10-2004-x64
1plugins/Fun.dll
windows10-2004-x64
1plugins/Hvnc.dll
windows10-2004-x64
1plugins/InfoGrab.dll
windows10-2004-x64
1plugins/KeyLogger.dll
windows10-2004-x64
1plugins/Ke...ne.dll
windows10-2004-x64
1plugins/Li...ne.dll
windows10-2004-x64
1plugins/Pr...er.dll
windows10-2004-x64
1plugins/Re...er.dll
windows10-2004-x64
1plugins/Re...xy.dll
windows10-2004-x64
1plugins/Sc...ol.dll
windows10-2004-x64
1plugins/Shell.dll
windows10-2004-x64
1plugins/Startup.dll
windows10-2004-x64
1plugins/Sy...er.dll
windows10-2004-x64
1plugins/Uacbypass.dll
windows10-2004-x64
1plugins/WebCam.dll
windows10-2004-x64
1stub/xeno ...nt.exe
windows10-2004-x64
10xeno rat server.exe
windows10-2004-x64
3Analysis
-
max time kernel
432s -
max time network
1155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 19:08
Behavioral task
behavioral1
Sample
Release.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
plugins/Chat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
plugins/File manager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
plugins/Fun.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
plugins/Hvnc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
plugins/InfoGrab.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
plugins/KeyLogger.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
plugins/KeyLoggerOffline.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
plugins/LiveMicrophone.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
plugins/ProcessManager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
plugins/Registry Manager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
plugins/ReverseProxy.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
plugins/ScreenControl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
plugins/Shell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
plugins/Startup.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
plugins/SystemPower.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
plugins/Uacbypass.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
plugins/WebCam.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
stub/xeno rat client.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
xeno rat server.exe
Resource
win10v2004-20241007-en
General
-
Target
Release.zip
-
Size
6.4MB
-
MD5
89661a9ff6de529497fec56a112bf75e
-
SHA1
2dd31a19489f4d7c562b647f69117e31b894b5c3
-
SHA256
e7b275d70655db9cb43fa606bbe2e4f22478ca4962bbf9f299d66eda567d63cd
-
SHA512
33c765bf85fbec0e58924ece948b80a7d73b7577557eaac8865e481c61ad6b71f8b5b846026103239b3bd21f438ff0d7c1430a51a4a149f16a215faad6dab68f
-
SSDEEP
196608:SYNI1S7C6S230UwVLW83FUSA7WQZzwM3/C2cM7m2:rNIs7CDvB1USA7WS/vcx2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4872 xeno rat server.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno rat server.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1144 7zFM.exe 1144 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1144 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1144 7zFM.exe Token: 35 1144 7zFM.exe Token: SeSecurityPrivilege 1144 7zFM.exe Token: SeDebugPrivilege 4872 xeno rat server.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1144 7zFM.exe 1144 7zFM.exe 4872 xeno rat server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4872 1144 7zFM.exe 90 PID 1144 wrote to memory of 4872 1144 7zFM.exe 90 PID 1144 wrote to memory of 4872 1144 7zFM.exe 90
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Release.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\7zO874270F7\xeno rat server.exe"C:\Users\Admin\AppData\Local\Temp\7zO874270F7\xeno rat server.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD53987ee127f2a2cf8a29573d4e111a8e8
SHA1fc253131e832297967f93190217f0ce403e38cb0
SHA2563d00a800474ddf382212e003222805bd74665b69cec43b554f91c3cd9edf04c4
SHA51269d5ac7a691dde1a3ed7f495e9b9180e63152ddaaa3d1b596ad9cbeb4d7b088f3fc4b138ecf87070014cdfa9047be18940b720de60642389921a10053250787b