Analysis
-
max time kernel
84s -
max time network
85s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08-02-2025 04:22
General
-
Target
Xeno.exe
-
Size
62KB
-
MD5
25f0b9cbe7919ff503407c6ef58d1cbd
-
SHA1
d7421c3eceacdeed5db5de0f047afe40d21ff145
-
SHA256
16136678f701be73ebaf5b08fa6c1eaf09e207bbdb3a8edd4d5a81ecb0c2387b
-
SHA512
bff8175621fa9204af6c78cb533d82a4c644550978cb3bcae8998ca5a65c0a5a4261096900c2d162ec28018e332f3ebebabeb86e3e5bb08782b2d78fed58d804
-
SSDEEP
768:1dhM/poiiUcjlJIn9mL9Xqk5nWEZ5SbTDaiNI7CPW5X:L2+jjgnoL9XqcnW85SbTTNI/
Malware Config
Extracted
xenorat
cryptobro.duckdns.org
Absolute
-
delay
10000
-
install_path
temp
-
port
25565
-
startup_name
svchosy
Signatures
-
Detect XenoRat Payload 5 IoCs
resource yara_rule behavioral1/memory/4564-1-0x00000000008F0000-0x0000000000906000-memory.dmp family_xenorat behavioral1/files/0x0009000000027f16-2.dat family_xenorat behavioral1/memory/2536-10-0x0000000005470000-0x0000000005482000-memory.dmp family_xenorat behavioral1/memory/2536-13-0x00000000059F0000-0x00000000059FC000-memory.dmp family_xenorat behavioral1/memory/3780-18-0x0000000005130000-0x000000000513A000-memory.dmp family_xenorat -
Xenorat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 20 2776 Process not Found -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-28130017-4025710482-1759186147-1000\Control Panel\International\Geo\Nation Xeno.exe Key value queried \REGISTRY\USER\S-1-5-21-28130017-4025710482-1759186147-1000\Control Panel\International\Geo\Nation Xeno.exe -
Executes dropped EXE 3 IoCs
pid Process 2536 Xeno.exe 3780 Xeno.exe 924 Xeno.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3796 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2684 schtasks.exe 3400 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 3780 Xeno.exe 3780 Xeno.exe 3780 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 3780 Xeno.exe 3780 Xeno.exe 3780 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 3780 Xeno.exe 3780 Xeno.exe 3780 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 3780 Xeno.exe 3780 Xeno.exe 3780 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 2536 Xeno.exe 3780 Xeno.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2536 Xeno.exe Token: SeDebugPrivilege 3780 Xeno.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4564 wrote to memory of 2536 4564 Xeno.exe 83 PID 4564 wrote to memory of 2536 4564 Xeno.exe 83 PID 4564 wrote to memory of 2536 4564 Xeno.exe 83 PID 2536 wrote to memory of 2684 2536 Xeno.exe 84 PID 2536 wrote to memory of 2684 2536 Xeno.exe 84 PID 2536 wrote to memory of 2684 2536 Xeno.exe 84 PID 2536 wrote to memory of 3780 2536 Xeno.exe 90 PID 2536 wrote to memory of 3780 2536 Xeno.exe 90 PID 2536 wrote to memory of 3780 2536 Xeno.exe 90 PID 3780 wrote to memory of 3400 3780 Xeno.exe 94 PID 3780 wrote to memory of 3400 3780 Xeno.exe 94 PID 3780 wrote to memory of 3400 3780 Xeno.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchosy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC38E.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchosy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9769.tmp" /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3400
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3796
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Xeno.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD566aea5e724c4a224d092067c3381783b
SHA1ee3cc64c4370a255391bdfeef2883d5b7a6e6230
SHA25604b17cab961f973464bba8924f764edef6451d1774f2405d27ef33d164296923
SHA5125d719e303f491d1443cb7c7e8946481e90532522a422c98f82466e1eddcd1ef24a4505dcbf75f2191fbb66825d3550566d7f408a3854edeb4c1a192c8c9a6d06
-
Filesize
62KB
MD525f0b9cbe7919ff503407c6ef58d1cbd
SHA1d7421c3eceacdeed5db5de0f047afe40d21ff145
SHA25616136678f701be73ebaf5b08fa6c1eaf09e207bbdb3a8edd4d5a81ecb0c2387b
SHA512bff8175621fa9204af6c78cb533d82a4c644550978cb3bcae8998ca5a65c0a5a4261096900c2d162ec28018e332f3ebebabeb86e3e5bb08782b2d78fed58d804
-
Filesize
1KB
MD546031de4e1206609084fe14fd9c9aed9
SHA110c6e88e81f9bf836fb5b64d75f4915cf8d33e4d
SHA2565cfd088da617ac453eaa0d34f9a0f9e9d2f07e6118a81f67b4e206d3b8566a16
SHA512a9580ea17a95c80b16c42d53ce81300d08526fd2416f5d4909b6a876daf5dc368fb8c37eaafe1e7dcc4d42e576517035315d0a92d40ec9110af0b66624f40c33