Analysis

  • max time kernel
    600s
  • max time network
    575s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250210-en
  • resource tags

    arch:x64arch:x86image:win11-20250210-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-02-2025 09:55

General

  • Target

    stub/xeno rat client.exe

  • Size

    46KB

  • MD5

    d23d8120af87a615a456a12b43d4a98a

  • SHA1

    73b41123d6f50aecdcf1c5e87a7d0319d753b0e7

  • SHA256

    27178a08e0d8fb6e5e31ae9bff6194a5224406666fa1f528d4719c1e4a8efd67

  • SHA512

    99026704fef97f9f9c01348310f199ad523851e105c7ea1f39312c7370cb6e50af5044fec1041298b96b6e661ac5f48d6af80687e21364806e62738d198ad319

  • SSDEEP

    768:Ddqf04XKojwYybbZWsiBHUuOkU7cK9F9km3XNZ5SbTDay6t22:D4z0z3ZWsiBHUuY79kmz5SbTL6B

Malware Config

Extracted

Family

xenorat

C2

localhost

Mutex

testing 123123

Attributes
  • delay

    1000

  • install_path

    nothingset

  • port

    1234

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 1 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 36 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\stub\xeno rat client.exe
    "C:\Users\Admin\AppData\Local\Temp\stub\xeno rat client.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2956
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTA1QTQ5RUItMzBDNS00OUFBLUFERTktMTBCOUJDM0Q2OUIzfSIgdXNlcmlkPSJ7RjkxMkEzRTUtOTFBMC00RDNDLTgyMUItNDVDRkUzN0QyQjJBfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7QUI1QjQ4RjgtQTFGMC00RjUyLUE2QjQtQTBGREJGMUZFNjNBfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4yMjAwMC40OTMiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjQiIGluc3RhbGxkYXRldGltZT0iMTczOTE4NzUwMCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNjU5NjY5NTQwMDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ5NzY0MTcyMjciLz48L2FwcD48L3JlcXVlc3Q-
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:3708
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\MicrosoftEdge_X64_133.0.3065.59.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4124
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff656786a68,0x7ff656786a74,0x7ff656786a80
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:924
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff656786a68,0x7ff656786a74,0x7ff656786a80
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:952
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6d45d6a68,0x7ff6d45d6a74,0x7ff6d45d6a80
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:4928
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6d45d6a68,0x7ff6d45d6a74,0x7ff6d45d6a80
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:3108
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6d45d6a68,0x7ff6d45d6a74,0x7ff6d45d6a80
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0C78F3BD-A12A-4DBA-B35D-EE21E7BC5C2E}\EDGEMITMP_1D756.tmp\setup.exe

    Filesize

    6.8MB

    MD5

    1b3e9c59f9c7a134ec630ada1eb76a39

    SHA1

    a7e831d392e99f3d37847dcc561dd2e017065439

    SHA256

    ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae

    SHA512

    c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

    Filesize

    3.9MB

    MD5

    ad5f7dc7ca3e67dce70c0a89c04519e0

    SHA1

    a10b03234627ca8f3f8034cd5637cda1b8246d83

    SHA256

    663fe0f4e090583e6aa5204b9a80b7a76f677259066e56a7345aebc6bc3e7d31

    SHA512

    ad5490e9865caa454c47ec2e96364b9c566b553e64801da60c295acd570017747be1aff6f22ca6c20c6eee6f6d05a058af72569fd6e656f66e48010978c7fd51

  • C:\Windows\SystemTemp\msedge_installer.log

    Filesize

    74KB

    MD5

    c05e422e4988c75c9d11bdda9862d106

    SHA1

    291509433bc79367c30dfe805d71a7032e61a0ef

    SHA256

    94ca1e603c92f8290dc9fd3a82c65a7b4530bb72ba86a2acdf0bb2e3ebe6461c

    SHA512

    9a522756e652b41427058608cf6cf7666b5fd74dade0e4a9ead7dc2d96fa7445d2fabb178051a511b445f8312c94445bcfa1c358f228e8f25dd6e3106dfbb4ea

  • C:\Windows\SystemTemp\msedge_installer.log

    Filesize

    101KB

    MD5

    cfb20e243b5fa310a5d87fbe1f92e375

    SHA1

    500762c2707aa9971e2fd0dd7795b4888735d62e

    SHA256

    e6c71a31515793397c4e1da19d2a2bc0526a82884e620141fc4f4bf021891b72

    SHA512

    dafbd5271695a816105583d1856d8e1ddd390e576eb234cb9fcd64e9966d7118cb21aee5b77380abde2c4a7b60eecb375d8416213388b83d539e6878f99bf3bd

  • C:\Windows\SystemTemp\msedge_installer.log

    Filesize

    104KB

    MD5

    e00ca997338b89d153226d2d9158937f

    SHA1

    d16bfc3c6f1787b7f565db173343b32af6087019

    SHA256

    e9ce0f8a087b6a3d831c2d41664323122bcd4bb997dedf3c6280b6bb6e663af1

    SHA512

    9f031c5c3aab05149fdaed8de56c4497eec6212098340ab7c634eccdeb1d38e43a6d901756c6aaa5159c5d45ab42ec9107a14f9fa10bb4b0892944c4bd6f0674

  • C:\Windows\SystemTemp\msedge_installer.log

    Filesize

    107KB

    MD5

    0a2124b60de6f9892e80f0f758aea627

    SHA1

    84ef1ef440d760edc6dda0ca050cc6595a76167c

    SHA256

    7261dd837dd0a0857b1348c482599897318490f2c4abde93f99fa6b1f262a372

    SHA512

    62abdfcc45db88de70b69bfb51fbbb2580bfdbc42a3b8eb7c17ab1fafa405322b50a5d5fb7ce075f5d97f905d60fab5c9603355fd4cb98e5cdbfc9c7297e3424

  • memory/2956-0-0x0000000073E8E000-0x0000000073E8F000-memory.dmp

    Filesize

    4KB

  • memory/2956-1-0x0000000000AA0000-0x0000000000AB2000-memory.dmp

    Filesize

    72KB

  • memory/2956-2-0x0000000073E80000-0x0000000074631000-memory.dmp

    Filesize

    7.7MB

  • memory/2956-3-0x0000000073E8E000-0x0000000073E8F000-memory.dmp

    Filesize

    4KB

  • memory/2956-4-0x0000000073E80000-0x0000000074631000-memory.dmp

    Filesize

    7.7MB