Analysis

  • max time kernel
    149s
  • max time network
    204s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-01-2025 16:39

General

  • Target

    xeno rat server.exe

  • Size

    2.0MB

  • MD5

    3987ee127f2a2cf8a29573d4e111a8e8

  • SHA1

    fc253131e832297967f93190217f0ce403e38cb0

  • SHA256

    3d00a800474ddf382212e003222805bd74665b69cec43b554f91c3cd9edf04c4

  • SHA512

    69d5ac7a691dde1a3ed7f495e9b9180e63152ddaaa3d1b596ad9cbeb4d7b088f3fc4b138ecf87070014cdfa9047be18940b720de60642389921a10053250787b

  • SSDEEP

    49152:EnxkNTRWjxoJochWQI3kqXfd+/9AManGhR0vNgtIeGWtOc5Q:ExkNTcaJhDI3kqXf0FtWykQDCiQ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xeno rat server.exe
    "C:\Users\Admin\AppData\Local\Temp\xeno rat server.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

    Filesize

    14KB

    MD5

    1ee4bb6aa36eb9d91c9d3c085a008885

    SHA1

    84e8b47a7c59db6839f61ce70d7ded716e629e6f

    SHA256

    2c5e98a9db577d4072519757694ac5f26f714f12c14a2c5e666edcd9fcd82984

    SHA512

    d17e930bffaa0a5af38e77cdc320fb1c59d756427491362e4419c44d225022873e0c393de6147b2dacf79849932aec6c71b7e68a8a5241a02564e922ac907e45

  • memory/3368-8-0x0000000007AE0000-0x0000000007AF2000-memory.dmp

    Filesize

    72KB

  • memory/3368-3-0x0000000005100000-0x0000000005192000-memory.dmp

    Filesize

    584KB

  • memory/3368-10-0x000000007521E000-0x000000007521F000-memory.dmp

    Filesize

    4KB

  • memory/3368-11-0x0000000075210000-0x00000000759C1000-memory.dmp

    Filesize

    7.7MB

  • memory/3368-5-0x0000000075210000-0x00000000759C1000-memory.dmp

    Filesize

    7.7MB

  • memory/3368-6-0x00000000078F0000-0x0000000007904000-memory.dmp

    Filesize

    80KB

  • memory/3368-7-0x0000000007AC0000-0x0000000007ADA000-memory.dmp

    Filesize

    104KB

  • memory/3368-0-0x000000007521E000-0x000000007521F000-memory.dmp

    Filesize

    4KB

  • memory/3368-1-0x0000000000520000-0x0000000000722000-memory.dmp

    Filesize

    2.0MB

  • memory/3368-2-0x0000000005610000-0x0000000005BB6000-memory.dmp

    Filesize

    5.6MB

  • memory/3368-4-0x00000000050D0000-0x00000000050DA000-memory.dmp

    Filesize

    40KB

  • memory/3368-12-0x0000000007B30000-0x0000000007BE2000-memory.dmp

    Filesize

    712KB

  • memory/3368-13-0x0000000008130000-0x0000000008487000-memory.dmp

    Filesize

    3.3MB

  • memory/3368-16-0x0000000075210000-0x00000000759C1000-memory.dmp

    Filesize

    7.7MB

  • memory/3368-17-0x0000000075210000-0x00000000759C1000-memory.dmp

    Filesize

    7.7MB

  • memory/3368-19-0x0000000007C60000-0x0000000007D84000-memory.dmp

    Filesize

    1.1MB

  • memory/3368-20-0x0000000007D80000-0x0000000007D9A000-memory.dmp

    Filesize

    104KB

  • memory/3368-9-0x00000000099E0000-0x0000000009A02000-memory.dmp

    Filesize

    136KB