Analysis
-
max time kernel
16s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-02-2025 16:14
Static task
static1
Behavioral task
behavioral1
Sample
KQlljCB.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
KQlljCB.exe
Resource
win10ltsc2021-20250211-en
General
-
Target
KQlljCB.exe
-
Size
499KB
-
MD5
7289b991c37d058b2e69b3983f75d122
-
SHA1
b89acc7669c5e84c1e5e9bcf0822df8803f10e43
-
SHA256
9df32d691dc6483d47b40e6154aeff36f0acdc009c07b4af48618c4fb6b21b9f
-
SHA512
958e5ba3326d01653d5218f578c909012d4a26d0bad7a467569395a080d5531103c92cd55cf049daa491826ea371dc3cc665560dcab127b6e38c9e399359a60c
-
SSDEEP
12288:d7Wnj4mpB/33bxyy0vyJ2qiJSUINUpqag73a3Bkl:tyjVn/3LxavmzsINUpvg7
Malware Config
Extracted
xenorat
196.251.87.37
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4782
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 5 IoCs
resource yara_rule behavioral1/memory/2880-5-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2880-3-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2880-2-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2880-7-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2880-9-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2132 msbuild.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 2880 2376 KQlljCB.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msbuild.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2880 2376 KQlljCB.exe 31 PID 2376 wrote to memory of 2880 2376 KQlljCB.exe 31 PID 2376 wrote to memory of 2880 2376 KQlljCB.exe 31 PID 2376 wrote to memory of 2880 2376 KQlljCB.exe 31 PID 2376 wrote to memory of 2880 2376 KQlljCB.exe 31 PID 2376 wrote to memory of 2880 2376 KQlljCB.exe 31 PID 2376 wrote to memory of 2880 2376 KQlljCB.exe 31 PID 2376 wrote to memory of 2880 2376 KQlljCB.exe 31 PID 2376 wrote to memory of 2880 2376 KQlljCB.exe 31 PID 2880 wrote to memory of 2132 2880 msbuild.exe 32 PID 2880 wrote to memory of 2132 2880 msbuild.exe 32 PID 2880 wrote to memory of 2132 2880 msbuild.exe 32 PID 2880 wrote to memory of 2132 2880 msbuild.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\KQlljCB.exe"C:\Users\Admin\AppData\Local\Temp\KQlljCB.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\msbuild.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\msbuild.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD59af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3