Analysis
-
max time kernel
131s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 19:53
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
General
-
Target
Client.exe
-
Size
45KB
-
MD5
dd96a8b21fb100affb8df038d0b8b571
-
SHA1
d51aaf85de04ba1f9d0fdb15579d9bd7a2fd343c
-
SHA256
add0eddbaee1ea36c8f7879c17b3b5fc0f2cf0982b47c9aecf66b6b97a2d3ca4
-
SHA512
fe509d0e9719e20ea85775f96f9367d91881c1e485e50aa22cfb677e186c1ffd9352deed72373ca37abe06180097438e6038164b30991b1e9087f53298942d47
-
SSDEEP
768:YdhO/poiiUcjlJIn5fdH9Xqk5nWEZ5SbTDaoWI7CPW5g:Kw+jjgnpdH9XqcnW85SbTJWIo
Malware Config
Extracted
xenorat
anyone-center.gl.at.ply.gg
4dfb8031-19a0-4b82-bddc-e152f936aa12
-
delay
4000
-
install_path
appdata
-
port
8080
-
startup_name
Update.exe
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2900-1-0x0000000000CB0000-0x0000000000CC2000-memory.dmp family_xenorat behavioral1/files/0x000800000001662e-7.dat family_xenorat behavioral1/memory/2400-9-0x0000000000A90000-0x0000000000AA2000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2400 Client.exe -
Loads dropped DLL 1 IoCs
pid Process 2900 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1964 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2400 2900 Client.exe 30 PID 2900 wrote to memory of 2400 2900 Client.exe 30 PID 2900 wrote to memory of 2400 2900 Client.exe 30 PID 2900 wrote to memory of 2400 2900 Client.exe 30 PID 2400 wrote to memory of 1964 2400 Client.exe 31 PID 2400 wrote to memory of 1964 2400 Client.exe 31 PID 2400 wrote to memory of 1964 2400 Client.exe 31 PID 2400 wrote to memory of 1964 2400 Client.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\XenoManager\Client.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Client.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Update.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA69B.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e8866bed06a0b5155010fbbf77e2c1b6
SHA1ac340e71878732fdb9baa7370e46e0d131b587ea
SHA2561dd2854ea9bd999669c85d57a63402a9cd2879ad3c94b86981e9eb3251d87a2a
SHA5121d702e5d9273af39aea0df3fcce0df4979f9c361d52673d7a0916c2b55765536596d8dc1aadb3c27d2e3a001c3a5269e7146fc44d20af11c08394932ff633990
-
Filesize
45KB
MD5dd96a8b21fb100affb8df038d0b8b571
SHA1d51aaf85de04ba1f9d0fdb15579d9bd7a2fd343c
SHA256add0eddbaee1ea36c8f7879c17b3b5fc0f2cf0982b47c9aecf66b6b97a2d3ca4
SHA512fe509d0e9719e20ea85775f96f9367d91881c1e485e50aa22cfb677e186c1ffd9352deed72373ca37abe06180097438e6038164b30991b1e9087f53298942d47