Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-02-2025 16:17
Behavioral task
behavioral1
Sample
BootstrapperNew1.exe
Resource
win7-20240903-en
General
-
Target
BootstrapperNew1.exe
-
Size
50KB
-
MD5
1eff35c8530e3775e44c9f7096ebcda0
-
SHA1
41b00fb6bb5d0cece18910d3789f6a70b5eb1906
-
SHA256
15b6b5588bca8c558900e44092cb741a872974e33ccb8547618cad751e464b9c
-
SHA512
7ae7b6e09b8afba8b27fa4db75c100659ef1e671c11b877067763ebf352f3a05404c71e587727e3cd15f68acaf539da4328f6785e4c28646e8e490c4c98903e0
-
SSDEEP
768:qdhO/poiiUcjlJIn3dH9Xqk5nWEZ5SbTDa5WI7CPW5ispY:Mw+jjgntH9XqcnW85SbTIWIqspY
Malware Config
Extracted
xenorat
192.168.1.236
Xeno_rat_nd8912d
-
delay
4785
-
install_path
appdata
-
port
1194
-
startup_name
Solara Bootstrapper Dependinces
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2816-1-0x0000000000CC0000-0x0000000000CD2000-memory.dmp family_xenorat behavioral1/files/0x0008000000016d63-4.dat family_xenorat behavioral1/memory/2696-9-0x0000000000210000-0x0000000000222000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2696 BootstrapperNew1.exe -
Loads dropped DLL 1 IoCs
pid Process 2816 BootstrapperNew1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 536 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2696 2816 BootstrapperNew1.exe 30 PID 2816 wrote to memory of 2696 2816 BootstrapperNew1.exe 30 PID 2816 wrote to memory of 2696 2816 BootstrapperNew1.exe 30 PID 2816 wrote to memory of 2696 2816 BootstrapperNew1.exe 30 PID 2696 wrote to memory of 536 2696 BootstrapperNew1.exe 31 PID 2696 wrote to memory of 536 2696 BootstrapperNew1.exe 31 PID 2696 wrote to memory of 536 2696 BootstrapperNew1.exe 31 PID 2696 wrote to memory of 536 2696 BootstrapperNew1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew1.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew1.exe"C:\Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Solara Bootstrapper Dependinces" /XML "C:\Users\Admin\AppData\Local\Temp\tmp81CD.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54f1a3f65c726a5d1b6738fc85f4a9925
SHA1e207b950c2f65eb9e4f59967afefa139748f4a6f
SHA2564820306e4bbf03801fb906ef2fcdd956b9d8a5949870ece25ac21244e3285d93
SHA512fc836daa24cf6245f3fb6261c06e6735925a17149e7297ea4c24b297ea91eb4d9f17d8b090f0e24e970d58ba797498c390735192c5352e32ac88b1312e665339
-
Filesize
50KB
MD51eff35c8530e3775e44c9f7096ebcda0
SHA141b00fb6bb5d0cece18910d3789f6a70b5eb1906
SHA25615b6b5588bca8c558900e44092cb741a872974e33ccb8547618cad751e464b9c
SHA5127ae7b6e09b8afba8b27fa4db75c100659ef1e671c11b877067763ebf352f3a05404c71e587727e3cd15f68acaf539da4328f6785e4c28646e8e490c4c98903e0