Analysis
-
max time kernel
128s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/03/2025, 16:54
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240903-en
General
-
Target
test.exe
-
Size
46KB
-
MD5
550f478c2fc3b63c03f0ba77f5bc0ba3
-
SHA1
d59302c72e40e9e59a9f3277193b45b6bfa9efd8
-
SHA256
2e7a2d807698416a3fdcc5691770fab39a1ec738487328bae34f135c7ef25a05
-
SHA512
3945fdbd052d8ecf586a5d4874a98fee76d27e2c00e6f4a9f118ca4e613d37403eaf36edb27897538806c434c73aae23f331c25e07fd7b596af7a8e2f0708eea
-
SSDEEP
768:tdhO/poiiUcjlJInZ0H9Xqk5nWEZ5SbTDagWI7CPW5c:jw+jjgneH9XqcnW85SbT5WIk
Malware Config
Extracted
xenorat
dwdwdad2-57443.portmap.host
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
57443
-
startup_name
Windows defender security notification icon
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2492-1-0x0000000000F70000-0x0000000000F82000-memory.dmp family_xenorat behavioral1/files/0x0008000000015d07-4.dat family_xenorat behavioral1/memory/2708-10-0x0000000000EA0000-0x0000000000EB2000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2708 test.exe -
Loads dropped DLL 1 IoCs
pid Process 2492 test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 336 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2708 2492 test.exe 30 PID 2492 wrote to memory of 2708 2492 test.exe 30 PID 2492 wrote to memory of 2708 2492 test.exe 30 PID 2492 wrote to memory of 2708 2492 test.exe 30 PID 2708 wrote to memory of 336 2708 test.exe 31 PID 2708 wrote to memory of 336 2708 test.exe 31 PID 2708 wrote to memory of 336 2708 test.exe 31 PID 2708 wrote to memory of 336 2708 test.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Roaming\XenoManager\test.exe"C:\Users\Admin\AppData\Roaming\XenoManager\test.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows defender security notification icon" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBE40.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d14add5bc544dc56500dab4dcc70f120
SHA1626a696608ee981a0e8d6bde221c0dcb961c2644
SHA256e549e2fef562f01fc2d18ba0b34521bb6f87ba4ca0dcfc82002c9dfcffa07ad0
SHA5123a19b6d12218a2e66dab2175098a392a8ec489711852a05542e3a156876fb1b0a0806ee5839741a196117d111ef5ea2a0562c7999eab3861f5f81ba9c03098db
-
Filesize
46KB
MD5550f478c2fc3b63c03f0ba77f5bc0ba3
SHA1d59302c72e40e9e59a9f3277193b45b6bfa9efd8
SHA2562e7a2d807698416a3fdcc5691770fab39a1ec738487328bae34f135c7ef25a05
SHA5123945fdbd052d8ecf586a5d4874a98fee76d27e2c00e6f4a9f118ca4e613d37403eaf36edb27897538806c434c73aae23f331c25e07fd7b596af7a8e2f0708eea