Analysis
-
max time kernel
71s -
max time network
77s -
platform
windows11-21h2_x64 -
resource
win11-20250210-en -
resource tags
arch:x64arch:x86image:win11-20250210-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-02-2025 15:54
General
-
Target
test.exe
-
Size
45KB
-
MD5
1e05557defdc34b585d6cc8505321bd6
-
SHA1
d4ba25063f8967f12681cff8016bb88f479c1bbe
-
SHA256
18f165749ec85eaf6eb5dd7560d2e735f43a25efab54b5098b8239349ed43fc1
-
SHA512
b7e5a0fd7e63c5b18beb938f6395aaad233eae1b46023e85fee807cad5d503645770fd942e12b7467aa9236e372ec1e496dd2a935fb4d3cd423bec882ccf4eb5
-
SSDEEP
768:ZdhO/poiiUcjlJInngH9Xqk5nWEZ5SbTDaYuI7CPW5I:Xw+jjgngH9XqcnW85SbT9uIA
Malware Config
Extracted
xenorat
numbers-insights.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
52152
-
startup_name
cool
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/5116-1-0x0000000000A10000-0x0000000000A22000-memory.dmp family_xenorat behavioral1/memory/5116-9-0x0000000005FB0000-0x0000000005FBA000-memory.dmp family_xenorat -
Xenorat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 19 2800 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3972 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4472 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe 5116 test.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5116 test.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5116 wrote to memory of 4472 5116 test.exe 87 PID 5116 wrote to memory of 4472 5116 test.exe 87 PID 5116 wrote to memory of 4472 5116 test.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "cool" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE937.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4472
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjciIGluc3RhbGxkYXRldGltZT0iMTczOTE4NDAzMyIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNjU1NjU2MjA2MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ5MDI3OTgxMTkiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5861db5e2028bd0b60030d6659d265f7a
SHA1710ead100e3c494416662050a3f404b1105f04d8
SHA25643373690036af962d0a7449df979bfabb3f5fab84764a4b6b6df5ad8aec13b8f
SHA512c523733d5e5d3cdb9dc7bb326ec4c3a05bf967b540faaa365b5139958d206a83bada70fd19c5dd2bc2f4e4099851811a3a2e8346804ee136fe7d3f45328be9e1