Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-02-2025 15:12
Behavioral task
behavioral1
Sample
Test123.exe
Resource
win7-20240903-en
General
-
Target
Test123.exe
-
Size
50KB
-
MD5
99545fbd2d28cfc655152cbe703c0f04
-
SHA1
8f57e8f3d20955f98242a606c15f98724f45cfff
-
SHA256
151757ffe11b654323b52508bc9a84641caaf0ec97df01eef29cb3b5a0a4ac4b
-
SHA512
9ab34f9f1b96dc4053b5006b4ec51597d8ac45077291f82e3733f95bc7c1c75e5182b0de354ae81f20d9a8a1deb71fbddbf12d8d17118a68117088058beb5395
-
SSDEEP
768:PdhO/poiiUcjlJInaQH9Xqk5nWEZ5SbTDajWI7CPW5aspt:Fw+jjgnTH9XqcnW85SbTqWIyspt
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Solara Bootstrapper Dependinces
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2516-1-0x0000000000E60000-0x0000000000E72000-memory.dmp family_xenorat behavioral1/files/0x0008000000016cfe-4.dat family_xenorat behavioral1/memory/2960-9-0x0000000000B60000-0x0000000000B72000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2960 Test123.exe -
Loads dropped DLL 1 IoCs
pid Process 2516 Test123.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Test123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Test123.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2684 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2960 2516 Test123.exe 30 PID 2516 wrote to memory of 2960 2516 Test123.exe 30 PID 2516 wrote to memory of 2960 2516 Test123.exe 30 PID 2516 wrote to memory of 2960 2516 Test123.exe 30 PID 2960 wrote to memory of 2684 2960 Test123.exe 31 PID 2960 wrote to memory of 2684 2960 Test123.exe 31 PID 2960 wrote to memory of 2684 2960 Test123.exe 31 PID 2960 wrote to memory of 2684 2960 Test123.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Test123.exe"C:\Users\Admin\AppData\Local\Temp\Test123.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\XenoManager\Test123.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Test123.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Solara Bootstrapper Dependinces" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9A1D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50048269382f29a7b64ef9de84a1bb22b
SHA1ec4562525a1bd8907642ed0b4a25ea9614c9d846
SHA256c0688d04fb3c409540d8f1816b5b468417900102a19b55c2332b1b626ce8441b
SHA5128249c10cf00d0cc6926dba000ee30fb9e88bf19779514bb013324443ce1d1e899595b029a78ad34871e9a34ff9c04b4c655eb9da39a4c6f0a3153e3c7d45d06d
-
Filesize
50KB
MD599545fbd2d28cfc655152cbe703c0f04
SHA18f57e8f3d20955f98242a606c15f98724f45cfff
SHA256151757ffe11b654323b52508bc9a84641caaf0ec97df01eef29cb3b5a0a4ac4b
SHA5129ab34f9f1b96dc4053b5006b4ec51597d8ac45077291f82e3733f95bc7c1c75e5182b0de354ae81f20d9a8a1deb71fbddbf12d8d17118a68117088058beb5395