Resubmissions

30-12-2024 02:03

241230-cg45cavjcq 10

30-12-2024 02:00

241230-ce2w7strdr 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-12-2024 02:00

General

  • Target

    xeno rat server.exe

  • Size

    2.0MB

  • MD5

    3987ee127f2a2cf8a29573d4e111a8e8

  • SHA1

    fc253131e832297967f93190217f0ce403e38cb0

  • SHA256

    3d00a800474ddf382212e003222805bd74665b69cec43b554f91c3cd9edf04c4

  • SHA512

    69d5ac7a691dde1a3ed7f495e9b9180e63152ddaaa3d1b596ad9cbeb4d7b088f3fc4b138ecf87070014cdfa9047be18940b720de60642389921a10053250787b

  • SSDEEP

    49152:EnxkNTRWjxoJochWQI3kqXfd+/9AManGhR0vNgtIeGWtOc5Q:ExkNTcaJhDI3kqXf0FtWykQDCiQ

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 4 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xeno rat server.exe
    "C:\Users\Admin\AppData\Local\Temp\xeno rat server.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3468
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3496
    • C:\Users\Admin\Downloads\alot.exe
      "C:\Users\Admin\Downloads\alot.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1672
    • C:\Users\Admin\Downloads\alot.exe
      "C:\Users\Admin\Downloads\alot.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Downloads\alot.exe

      Filesize

      45KB

      MD5

      e069304f72f1993e3a4227b5fb5337a1

      SHA1

      131c2b3eb9afb6a806610567fe846a09d60b5115

      SHA256

      5d00cfc66ae11f68bae4ac8e5a0f07158dae6bfd4ea34035b8c7c4e3be70f2c5

      SHA512

      26f18e40b1d4d97d997815fe3921af11f8e75e99a9386bbe39fb8820af1cbe4e9f41d3328b6a051f1d63a4dfff5b674a0abafae975f848df4272aa036771e2e9

    • memory/1672-43-0x0000000007F80000-0x0000000007F8A000-memory.dmp

      Filesize

      40KB

    • memory/1672-42-0x0000000005810000-0x000000000581A000-memory.dmp

      Filesize

      40KB

    • memory/1672-38-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/1672-37-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/1672-35-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/1672-34-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/1672-33-0x0000000000D70000-0x0000000000D82000-memory.dmp

      Filesize

      72KB

    • memory/2560-39-0x0000000006400000-0x0000000006466000-memory.dmp

      Filesize

      408KB

    • memory/3468-7-0x00000000082F0000-0x000000000830A000-memory.dmp

      Filesize

      104KB

    • memory/3468-9-0x000000000A210000-0x000000000A232000-memory.dmp

      Filesize

      136KB

    • memory/3468-11-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/3468-12-0x0000000008360000-0x0000000008412000-memory.dmp

      Filesize

      712KB

    • memory/3468-13-0x00000000088C0000-0x0000000008C17000-memory.dmp

      Filesize

      3.3MB

    • memory/3468-16-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/3468-17-0x0000000009730000-0x0000000009854000-memory.dmp

      Filesize

      1.1MB

    • memory/3468-18-0x0000000008D20000-0x0000000008D3A000-memory.dmp

      Filesize

      104KB

    • memory/3468-19-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/3468-10-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

      Filesize

      4KB

    • memory/3468-8-0x0000000008310000-0x0000000008322000-memory.dmp

      Filesize

      72KB

    • memory/3468-0-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

      Filesize

      4KB

    • memory/3468-6-0x0000000008120000-0x0000000008134000-memory.dmp

      Filesize

      80KB

    • memory/3468-5-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/3468-4-0x00000000058E0000-0x00000000058EA000-memory.dmp

      Filesize

      40KB

    • memory/3468-3-0x0000000005900000-0x0000000005992000-memory.dmp

      Filesize

      584KB

    • memory/3468-40-0x000000000C5A0000-0x000000000C5B2000-memory.dmp

      Filesize

      72KB

    • memory/3468-2-0x0000000006010000-0x00000000065B6000-memory.dmp

      Filesize

      5.6MB

    • memory/3468-1-0x0000000000C10000-0x0000000000E12000-memory.dmp

      Filesize

      2.0MB