Analysis
-
max time kernel
129s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 01:37
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20241010-en
General
-
Target
123.exe
-
Size
45KB
-
MD5
5a778e834f35c916c39c65d60e039fd0
-
SHA1
68f3eaf6f75f5121f478c9ddb18ac0bd87622c1a
-
SHA256
e7fa7df68f52c8211dcf98a83ce68d333c1c9ad47c695e1c81d251c71dab2267
-
SHA512
3a2af26f175124f04abcd7587a80caa948c3489c6a386274af865f2a0c47be62998b355abf8d92562cf022a2e8a2a1d7e269c9bbd3a4a58054822e15addc74e1
-
SSDEEP
768:RdhO/poiiUcjlJIn7rtUH9Xqk5nWEZ5SbTDaQWI7CPW5U:Pw+jjgn7BUH9XqcnW85SbThWIM
Malware Config
Extracted
xenorat
192.168.0.144
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2520-1-0x00000000012E0000-0x00000000012F2000-memory.dmp family_xenorat behavioral1/files/0x0008000000016ca5-4.dat family_xenorat behavioral1/memory/2436-9-0x00000000008C0000-0x00000000008D2000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2436 123.exe -
Loads dropped DLL 1 IoCs
pid Process 2520 123.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2436 2520 123.exe 30 PID 2520 wrote to memory of 2436 2520 123.exe 30 PID 2520 wrote to memory of 2436 2520 123.exe 30 PID 2520 wrote to memory of 2436 2520 123.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\123.exe"C:\Users\Admin\AppData\Local\Temp\123.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\XenoManager\123.exe"C:\Users\Admin\AppData\Roaming\XenoManager\123.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD55a778e834f35c916c39c65d60e039fd0
SHA168f3eaf6f75f5121f478c9ddb18ac0bd87622c1a
SHA256e7fa7df68f52c8211dcf98a83ce68d333c1c9ad47c695e1c81d251c71dab2267
SHA5123a2af26f175124f04abcd7587a80caa948c3489c6a386274af865f2a0c47be62998b355abf8d92562cf022a2e8a2a1d7e269c9bbd3a4a58054822e15addc74e1