Analysis

  • max time kernel
    283s
  • max time network
    279s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/03/2025, 22:25

General

  • Target

    Release.zip

  • Size

    6.4MB

  • MD5

    89661a9ff6de529497fec56a112bf75e

  • SHA1

    2dd31a19489f4d7c562b647f69117e31b894b5c3

  • SHA256

    e7b275d70655db9cb43fa606bbe2e4f22478ca4962bbf9f299d66eda567d63cd

  • SHA512

    33c765bf85fbec0e58924ece948b80a7d73b7577557eaac8865e481c61ad6b71f8b5b846026103239b3bd21f438ff0d7c1430a51a4a149f16a215faad6dab68f

  • SSDEEP

    196608:SYNI1S7C6S230UwVLW83FUSA7WQZzwM3/C2cM7m2:rNIs7CDvB1USA7WS/vcx2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Release.zip
    1⤵
      PID:4240
    • C:\Windows\system32\BackgroundTransferHost.exe
      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
      1⤵
      • Modifies registry class
      PID:5012
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4180
      • C:\Users\Admin\Desktop\Release\xeno rat server.exe
        "C:\Users\Admin\Desktop\Release\xeno rat server.exe"
        1⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        PID:4980

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\a7a1a124-22a2-4ed7-b2e8-45b377ac6a50.down_data

        Filesize

        555KB

        MD5

        5683c0028832cae4ef93ca39c8ac5029

        SHA1

        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

        SHA256

        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

        SHA512

        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

      • memory/4980-6-0x0000000000730000-0x0000000000932000-memory.dmp

        Filesize

        2.0MB

      • memory/4980-7-0x0000000005A70000-0x0000000006016000-memory.dmp

        Filesize

        5.6MB

      • memory/4980-8-0x00000000054C0000-0x0000000005552000-memory.dmp

        Filesize

        584KB

      • memory/4980-9-0x00000000053F0000-0x00000000053FA000-memory.dmp

        Filesize

        40KB

      • memory/4980-10-0x0000000006610000-0x0000000006624000-memory.dmp

        Filesize

        80KB

      • memory/4980-11-0x0000000007E20000-0x0000000007E3A000-memory.dmp

        Filesize

        104KB

      • memory/4980-12-0x0000000007E10000-0x0000000007E22000-memory.dmp

        Filesize

        72KB

      • memory/4980-13-0x0000000009D30000-0x0000000009D52000-memory.dmp

        Filesize

        136KB

      • memory/4980-14-0x0000000007F80000-0x0000000008032000-memory.dmp

        Filesize

        712KB

      • memory/4980-15-0x0000000008AE0000-0x0000000008E37000-memory.dmp

        Filesize

        3.3MB