Analysis

  • max time kernel
    302s
  • max time network
    339s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16-02-2025 17:28

General

  • Target

    BootstrapperNew 1.exe

  • Size

    50KB

  • MD5

    e04ffbc3f3dd5111ff1334d266652b79

  • SHA1

    b84171d543dd9f345813f0220142b9cfd9132e12

  • SHA256

    cd2c66350bccdd0152b592b3e7cb2c999e7923171f21a2ce887ac0d4eaf2032a

  • SHA512

    d65f661bd54f6aec9b7b5c10c87b90071c84c0c6d5a04d3a0727c1fdcf4099f5da2e3aeba7502e71c55059f8618c7dba85e1eb24dee8014b798ecc6eded93c3a

  • SSDEEP

    768:qdhO/poiiUcjlJInvdH9Xqk5nWEZ5SbTDaCWI7CPW5ispY:Mw+jjgnFH9XqcnW85SbTbWIqspY

Malware Config

Extracted

Family

xenorat

C2

108.77.173.66

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    3000

  • install_path

    appdata

  • port

    4758

  • startup_name

    Solara Bootstrapper Dependinces

Signatures

  • Detect XenoRat Payload 7 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew 1.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew 1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew 1.exe
      "C:\Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew 1.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "Solara Bootstrapper Dependinces" /XML "C:\Users\Admin\AppData\Local\Temp\tmp83DF.tmp" /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kui0mrai.ge5

    Filesize

    148KB

    MD5

    90a1d4b55edf36fa8b4cc6974ed7d4c4

    SHA1

    aba1b8d0e05421e7df5982899f626211c3c4b5c1

    SHA256

    7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

    SHA512

    ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

  • C:\Users\Admin\AppData\Local\Temp\tmp83DF.tmp

    Filesize

    1KB

    MD5

    0579f29ab936caa1c006d50f1afabd69

    SHA1

    afa6d1ab1e9b31cd9bf7acfac2bba38df09c431f

    SHA256

    23f8fa9c340f4d121e145654beba9923b9aec6e950b76162d1e4278dad391717

    SHA512

    26dd4b0bf8d4c71592ec86add436b3b91c0e278d26bf372bad755f900e1153c669b5c88b0b8d7d8a19f95bf781a644471f8b69e1ac27bac95544435c83a9f3ce

  • \Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew 1.exe

    Filesize

    50KB

    MD5

    e04ffbc3f3dd5111ff1334d266652b79

    SHA1

    b84171d543dd9f345813f0220142b9cfd9132e12

    SHA256

    cd2c66350bccdd0152b592b3e7cb2c999e7923171f21a2ce887ac0d4eaf2032a

    SHA512

    d65f661bd54f6aec9b7b5c10c87b90071c84c0c6d5a04d3a0727c1fdcf4099f5da2e3aeba7502e71c55059f8618c7dba85e1eb24dee8014b798ecc6eded93c3a

  • memory/1268-1-0x0000000001300000-0x0000000001312000-memory.dmp

    Filesize

    72KB

  • memory/1268-0-0x00000000749FE000-0x00000000749FF000-memory.dmp

    Filesize

    4KB

  • memory/1716-13-0x00000000749F0000-0x00000000750DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1716-10-0x00000000749F0000-0x00000000750DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1716-14-0x00000000749F0000-0x00000000750DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1716-15-0x00000000749F0000-0x00000000750DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1716-16-0x0000000005290000-0x000000000538A000-memory.dmp

    Filesize

    1000KB

  • memory/1716-22-0x0000000006180000-0x0000000006400000-memory.dmp

    Filesize

    2.5MB

  • memory/1716-33-0x00000000008E0000-0x00000000008EC000-memory.dmp

    Filesize

    48KB

  • memory/1716-34-0x0000000001EE0000-0x0000000001EEA000-memory.dmp

    Filesize

    40KB

  • memory/1716-9-0x00000000008F0000-0x0000000000902000-memory.dmp

    Filesize

    72KB

  • memory/1716-47-0x0000000004680000-0x000000000468A000-memory.dmp

    Filesize

    40KB