Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 04:25
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win7-20241010-en
General
-
Target
Xeno.exe
-
Size
62KB
-
MD5
25f0b9cbe7919ff503407c6ef58d1cbd
-
SHA1
d7421c3eceacdeed5db5de0f047afe40d21ff145
-
SHA256
16136678f701be73ebaf5b08fa6c1eaf09e207bbdb3a8edd4d5a81ecb0c2387b
-
SHA512
bff8175621fa9204af6c78cb533d82a4c644550978cb3bcae8998ca5a65c0a5a4261096900c2d162ec28018e332f3ebebabeb86e3e5bb08782b2d78fed58d804
-
SSDEEP
768:1dhM/poiiUcjlJIn9mL9Xqk5nWEZ5SbTDaiNI7CPW5X:L2+jjgnoL9XqcnW85SbTTNI/
Malware Config
Extracted
xenorat
cryptobro.duckdns.org
Absolute
-
delay
10000
-
install_path
temp
-
port
25565
-
startup_name
svchosy
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3060-1-0x00000000006A0000-0x00000000006B6000-memory.dmp family_xenorat behavioral2/files/0x0008000000023e08-6.dat family_xenorat -
Xenorat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 51 1848 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-895555807-3853795127-2958627047-1000\Control Panel\International\Geo\Nation Xeno.exe -
Executes dropped EXE 1 IoCs
pid Process 4440 Xeno.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2148 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3664 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3060 wrote to memory of 4440 3060 Xeno.exe 88 PID 3060 wrote to memory of 4440 3060 Xeno.exe 88 PID 3060 wrote to memory of 4440 3060 Xeno.exe 88 PID 4440 wrote to memory of 3664 4440 Xeno.exe 90 PID 4440 wrote to memory of 3664 4440 Xeno.exe 90 PID 4440 wrote to memory of 3664 4440 Xeno.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchosy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCAA3.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3664
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7N0QxMTY2RDMtRkJFNy00QzlCLTk3MDAtNjU5OUYzQTc0NUM0fSIgdXNlcmlkPSJ7MEJFMTc1RjQtNjFENC00Q0QxLTkwRDktQ0VCQ0I2MzQ0QjI2fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7RTdENDNDOUYtMzk2My00MUUwLTkxMjEtRjEwREU2MzY4REQ4fSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4MzAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTE0Njg3NjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Mzc1NDg4NTAzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
62KB
MD525f0b9cbe7919ff503407c6ef58d1cbd
SHA1d7421c3eceacdeed5db5de0f047afe40d21ff145
SHA25616136678f701be73ebaf5b08fa6c1eaf09e207bbdb3a8edd4d5a81ecb0c2387b
SHA512bff8175621fa9204af6c78cb533d82a4c644550978cb3bcae8998ca5a65c0a5a4261096900c2d162ec28018e332f3ebebabeb86e3e5bb08782b2d78fed58d804
-
Filesize
1KB
MD546031de4e1206609084fe14fd9c9aed9
SHA110c6e88e81f9bf836fb5b64d75f4915cf8d33e4d
SHA2565cfd088da617ac453eaa0d34f9a0f9e9d2f07e6118a81f67b4e206d3b8566a16
SHA512a9580ea17a95c80b16c42d53ce81300d08526fd2416f5d4909b6a876daf5dc368fb8c37eaafe1e7dcc4d42e576517035315d0a92d40ec9110af0b66624f40c33