Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 04:25
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win7-20241010-en
General
-
Target
Xeno.exe
-
Size
62KB
-
MD5
25f0b9cbe7919ff503407c6ef58d1cbd
-
SHA1
d7421c3eceacdeed5db5de0f047afe40d21ff145
-
SHA256
16136678f701be73ebaf5b08fa6c1eaf09e207bbdb3a8edd4d5a81ecb0c2387b
-
SHA512
bff8175621fa9204af6c78cb533d82a4c644550978cb3bcae8998ca5a65c0a5a4261096900c2d162ec28018e332f3ebebabeb86e3e5bb08782b2d78fed58d804
-
SSDEEP
768:1dhM/poiiUcjlJIn9mL9Xqk5nWEZ5SbTDaiNI7CPW5X:L2+jjgnoL9XqcnW85SbTTNI/
Malware Config
Extracted
xenorat
cryptobro.duckdns.org
Absolute
-
delay
10000
-
install_path
temp
-
port
25565
-
startup_name
svchosy
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2860-1-0x0000000000D20000-0x0000000000D36000-memory.dmp family_xenorat behavioral1/files/0x0030000000018b71-4.dat family_xenorat behavioral1/memory/3032-9-0x00000000011C0000-0x00000000011D6000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 3032 Xeno.exe -
Loads dropped DLL 1 IoCs
pid Process 2860 Xeno.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2924 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2860 wrote to memory of 3032 2860 Xeno.exe 30 PID 2860 wrote to memory of 3032 2860 Xeno.exe 30 PID 2860 wrote to memory of 3032 2860 Xeno.exe 30 PID 2860 wrote to memory of 3032 2860 Xeno.exe 30 PID 3032 wrote to memory of 2924 3032 Xeno.exe 31 PID 3032 wrote to memory of 2924 3032 Xeno.exe 31 PID 3032 wrote to memory of 2924 3032 Xeno.exe 31 PID 3032 wrote to memory of 2924 3032 Xeno.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchosy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC9D4.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD546031de4e1206609084fe14fd9c9aed9
SHA110c6e88e81f9bf836fb5b64d75f4915cf8d33e4d
SHA2565cfd088da617ac453eaa0d34f9a0f9e9d2f07e6118a81f67b4e206d3b8566a16
SHA512a9580ea17a95c80b16c42d53ce81300d08526fd2416f5d4909b6a876daf5dc368fb8c37eaafe1e7dcc4d42e576517035315d0a92d40ec9110af0b66624f40c33
-
Filesize
62KB
MD525f0b9cbe7919ff503407c6ef58d1cbd
SHA1d7421c3eceacdeed5db5de0f047afe40d21ff145
SHA25616136678f701be73ebaf5b08fa6c1eaf09e207bbdb3a8edd4d5a81ecb0c2387b
SHA512bff8175621fa9204af6c78cb533d82a4c644550978cb3bcae8998ca5a65c0a5a4261096900c2d162ec28018e332f3ebebabeb86e3e5bb08782b2d78fed58d804