Analysis
-
max time kernel
300s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19/03/2025, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3.exe
Resource
win7-20241023-en
General
-
Target
0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3.exe
-
Size
612KB
-
MD5
5cb029f745b0691ec119a958319c31ef
-
SHA1
e7079a4aa2715132d6ea4ac4e7997effea00e979
-
SHA256
0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3
-
SHA512
61bbb3929c8d233bc3ebb265094ff515ad509a18903edbad887f1d9ad23982ace2adc619f9bde098565a20674ce29973ac2bc83558a3f6f5b02548df09e68094
-
SSDEEP
12288:ycrNS33L10QdrXpxen47qBmk1cNi3qYjY7fopC4xky2tuqFUmt:ZNA3R5drXPe47qBmk1+i39jWfopCObqJ
Malware Config
Extracted
xenorat
salutoepiesircam.sytes.net
Xeno_rat_nd8911d
-
delay
5000
-
install_path
appdata
-
port
4450
-
startup_name
setting
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/1492-51-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/1492-45-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/1492-42-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 7 IoCs
pid Process 2804 afgsfxf.sfx.exe 2112 afgsfxf.exe 1492 afgsfxf.exe 1760 afgsfxf.exe 2348 afgsfxf.exe 1632 afgsfxf.exe 2168 afgsfxf.exe -
Loads dropped DLL 8 IoCs
pid Process 2896 cmd.exe 2804 afgsfxf.sfx.exe 2804 afgsfxf.sfx.exe 2804 afgsfxf.sfx.exe 2804 afgsfxf.sfx.exe 2112 afgsfxf.exe 2112 afgsfxf.exe 1760 afgsfxf.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2112 set thread context of 1492 2112 afgsfxf.exe 34 PID 2112 set thread context of 1760 2112 afgsfxf.exe 35 PID 2348 set thread context of 1632 2348 afgsfxf.exe 37 PID 2348 set thread context of 2168 2348 afgsfxf.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afgsfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afgsfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afgsfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afgsfxf.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afgsfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afgsfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afgsfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2360 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2112 afgsfxf.exe Token: SeDebugPrivilege 2348 afgsfxf.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2896 2628 0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3.exe 30 PID 2628 wrote to memory of 2896 2628 0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3.exe 30 PID 2628 wrote to memory of 2896 2628 0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3.exe 30 PID 2628 wrote to memory of 2896 2628 0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3.exe 30 PID 2896 wrote to memory of 2804 2896 cmd.exe 32 PID 2896 wrote to memory of 2804 2896 cmd.exe 32 PID 2896 wrote to memory of 2804 2896 cmd.exe 32 PID 2896 wrote to memory of 2804 2896 cmd.exe 32 PID 2804 wrote to memory of 2112 2804 afgsfxf.sfx.exe 33 PID 2804 wrote to memory of 2112 2804 afgsfxf.sfx.exe 33 PID 2804 wrote to memory of 2112 2804 afgsfxf.sfx.exe 33 PID 2804 wrote to memory of 2112 2804 afgsfxf.sfx.exe 33 PID 2112 wrote to memory of 1492 2112 afgsfxf.exe 34 PID 2112 wrote to memory of 1492 2112 afgsfxf.exe 34 PID 2112 wrote to memory of 1492 2112 afgsfxf.exe 34 PID 2112 wrote to memory of 1492 2112 afgsfxf.exe 34 PID 2112 wrote to memory of 1492 2112 afgsfxf.exe 34 PID 2112 wrote to memory of 1492 2112 afgsfxf.exe 34 PID 2112 wrote to memory of 1492 2112 afgsfxf.exe 34 PID 2112 wrote to memory of 1492 2112 afgsfxf.exe 34 PID 2112 wrote to memory of 1492 2112 afgsfxf.exe 34 PID 2112 wrote to memory of 1760 2112 afgsfxf.exe 35 PID 2112 wrote to memory of 1760 2112 afgsfxf.exe 35 PID 2112 wrote to memory of 1760 2112 afgsfxf.exe 35 PID 2112 wrote to memory of 1760 2112 afgsfxf.exe 35 PID 2112 wrote to memory of 1760 2112 afgsfxf.exe 35 PID 2112 wrote to memory of 1760 2112 afgsfxf.exe 35 PID 2112 wrote to memory of 1760 2112 afgsfxf.exe 35 PID 2112 wrote to memory of 1760 2112 afgsfxf.exe 35 PID 2112 wrote to memory of 1760 2112 afgsfxf.exe 35 PID 1760 wrote to memory of 2348 1760 afgsfxf.exe 36 PID 1760 wrote to memory of 2348 1760 afgsfxf.exe 36 PID 1760 wrote to memory of 2348 1760 afgsfxf.exe 36 PID 1760 wrote to memory of 2348 1760 afgsfxf.exe 36 PID 2348 wrote to memory of 1632 2348 afgsfxf.exe 37 PID 2348 wrote to memory of 1632 2348 afgsfxf.exe 37 PID 2348 wrote to memory of 1632 2348 afgsfxf.exe 37 PID 2348 wrote to memory of 1632 2348 afgsfxf.exe 37 PID 2348 wrote to memory of 1632 2348 afgsfxf.exe 37 PID 2348 wrote to memory of 1632 2348 afgsfxf.exe 37 PID 2348 wrote to memory of 1632 2348 afgsfxf.exe 37 PID 2348 wrote to memory of 1632 2348 afgsfxf.exe 37 PID 2348 wrote to memory of 1632 2348 afgsfxf.exe 37 PID 2348 wrote to memory of 2168 2348 afgsfxf.exe 38 PID 2348 wrote to memory of 2168 2348 afgsfxf.exe 38 PID 2348 wrote to memory of 2168 2348 afgsfxf.exe 38 PID 2348 wrote to memory of 2168 2348 afgsfxf.exe 38 PID 2348 wrote to memory of 2168 2348 afgsfxf.exe 38 PID 2348 wrote to memory of 2168 2348 afgsfxf.exe 38 PID 2348 wrote to memory of 2168 2348 afgsfxf.exe 38 PID 2348 wrote to memory of 2168 2348 afgsfxf.exe 38 PID 2348 wrote to memory of 2168 2348 afgsfxf.exe 38 PID 1492 wrote to memory of 2360 1492 afgsfxf.exe 39 PID 1492 wrote to memory of 2360 1492 afgsfxf.exe 39 PID 1492 wrote to memory of 2360 1492 afgsfxf.exe 39 PID 1492 wrote to memory of 2360 1492 afgsfxf.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3.exe"C:\Users\Admin\AppData\Local\Temp\0b9145613da75b127de6d9f0094a7b2813e3c8c651aec50aee83c1e722e63be3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\budshpdig.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\afgsfxf.sfx.exeafgsfxf.sfx.exe -pthngaqwscpolkmBuiofxvflfadfdyehngfszafugyRhvqxsHbgnmeYiorhn -dC:\Users\Admin\AppData\Local\Temp3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\afgsfxf.exe"C:\Users\Admin\AppData\Local\Temp\afgsfxf.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\afgsfxf.exeC:\Users\Admin\AppData\Local\Temp\afgsfxf.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "setting" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBC5D.tmp" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\afgsfxf.exeC:\Users\Admin\AppData\Local\Temp\afgsfxf.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Roaming\XenoManager\afgsfxf.exe"C:\Users\Admin\AppData\Roaming\XenoManager\afgsfxf.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\XenoManager\afgsfxf.exeC:\Users\Admin\AppData\Roaming\XenoManager\afgsfxf.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1632
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\afgsfxf.exeC:\Users\Admin\AppData\Roaming\XenoManager\afgsfxf.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD53c7b48100b1343fb5e491b6e25b3f973
SHA1c1f0101ce56b77b1e62d5cd8eedb058039a6a6f1
SHA25682af508a479aa7eb3710995954c09308b5610f141f65c57c296b19b2fa218a4b
SHA512989df1b3bfea4de6bda4bed0a027dc280d905dbffe6e7573f65b3acfc708f58fce83da939f8952e5ffa4b7c0f539e4a4b16bc409670513a643af95d6147b6108
-
Filesize
1KB
MD54ca9b69da92c5e2bccf63c0e57f8888d
SHA13812235f99f0f0685ecf6566816c8d0182601163
SHA2560320bb6bdd7e13012024f1239019036e8707883cc208e2a9d63827568e4ee18e
SHA512c912aef98bb83d9c6784574b01defd757f49a70079762d94961ee503a46b31502361bb067e345fcad733afd5f06dd00c6f6e8c98e7d010e96a7779ae6fb9853d
-
Filesize
238KB
MD5e1dc7c5bc0e25c682383ed45a4f1b62d
SHA1efb65a80c919f0c3b7d20f7e6936c4ed1bc39526
SHA2568698d7bb5416fc8975a61be1f58793bd93ce9a611b0934ba9c1c7bfbd48d5ad6
SHA512a194d7142c92ab1de1fc2c35d350a968085e116fa15dfda722c28c597eb33e0548de18717c48d308e6953cfbfc9c10996b2bcbc21ce60e5cb2c43fe860772dfc
-
Filesize
471KB
MD5b0f7c04b2eeecc36eaf4b8028f039fca
SHA1f4215f7f99a94bc0f11caed46fba0f5b6d894bf3
SHA25649189308da7b2d7038fc3cae77c4bffa62420b07ca4b833c85299f82d1e0dbf0
SHA512ee91d628a5dd338bad371018f5593d83e246c173b6c6aa8dcca6f5be37b06013417f01a8583baf7379f782c83e836fb385bdb20b5bad79484b8b4c0a407cce27