Analysis
-
max time kernel
132s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20250210-en -
resource tags
arch:x64arch:x86image:win11-20250210-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-02-2025 16:14
Static task
static1
Behavioral task
behavioral1
Sample
KQlljCB.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
KQlljCB.exe
Resource
win10ltsc2021-20250211-en
General
-
Target
KQlljCB.exe
-
Size
499KB
-
MD5
7289b991c37d058b2e69b3983f75d122
-
SHA1
b89acc7669c5e84c1e5e9bcf0822df8803f10e43
-
SHA256
9df32d691dc6483d47b40e6154aeff36f0acdc009c07b4af48618c4fb6b21b9f
-
SHA512
958e5ba3326d01653d5218f578c909012d4a26d0bad7a467569395a080d5531103c92cd55cf049daa491826ea371dc3cc665560dcab127b6e38c9e399359a60c
-
SSDEEP
12288:d7Wnj4mpB/33bxyy0vyJ2qiJSUINUpqag73a3Bkl:tyjVn/3LxavmzsINUpvg7
Malware Config
Extracted
xenorat
196.251.87.37
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4782
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral3/memory/3188-0-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Xenorat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 18 1528 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 2996 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3056 set thread context of 3188 3056 KQlljCB.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4324 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3188 3056 KQlljCB.exe 84 PID 3056 wrote to memory of 3188 3056 KQlljCB.exe 84 PID 3056 wrote to memory of 3188 3056 KQlljCB.exe 84 PID 3056 wrote to memory of 3188 3056 KQlljCB.exe 84 PID 3056 wrote to memory of 3188 3056 KQlljCB.exe 84 PID 3056 wrote to memory of 3188 3056 KQlljCB.exe 84 PID 3056 wrote to memory of 3188 3056 KQlljCB.exe 84 PID 3056 wrote to memory of 3188 3056 KQlljCB.exe 84 PID 3188 wrote to memory of 2996 3188 msbuild.exe 85 PID 3188 wrote to memory of 2996 3188 msbuild.exe 85 PID 3188 wrote to memory of 2996 3188 msbuild.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\KQlljCB.exe"C:\Users\Admin\AppData\Local\Temp\KQlljCB.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\msbuild.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\msbuild.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2996
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjUiIGluc3RhbGxkYXRldGltZT0iMTczOTE4NzUwMCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNjU5NjY5NTQwMDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU1MDkxODA4MDYiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
256KB
MD5d10a3cfcc08aae3a7234498f213cf89e
SHA1ccae4469a3a05fcb6e7af33019ca5357e5406dda
SHA2560da56bd07a486818b7735761001cc1d3ca5af645f369a3c206bcb6719fefff06
SHA51290a4a68b45113360d732ccac7698c74aa550c05d9883d287b808982800fce1a24abf69cf06b0f017babd647cafd3ca10aa894c59e6dab8ba1ff34c639bdf6427