Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 16:54
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240903-en
General
-
Target
test.exe
-
Size
46KB
-
MD5
550f478c2fc3b63c03f0ba77f5bc0ba3
-
SHA1
d59302c72e40e9e59a9f3277193b45b6bfa9efd8
-
SHA256
2e7a2d807698416a3fdcc5691770fab39a1ec738487328bae34f135c7ef25a05
-
SHA512
3945fdbd052d8ecf586a5d4874a98fee76d27e2c00e6f4a9f118ca4e613d37403eaf36edb27897538806c434c73aae23f331c25e07fd7b596af7a8e2f0708eea
-
SSDEEP
768:tdhO/poiiUcjlJInZ0H9Xqk5nWEZ5SbTDagWI7CPW5c:jw+jjgneH9XqcnW85SbT5WIk
Malware Config
Extracted
xenorat
dwdwdad2-57443.portmap.host
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
57443
-
startup_name
Windows defender security notification icon
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/1932-1-0x0000000000240000-0x0000000000252000-memory.dmp family_xenorat behavioral2/files/0x00080000000242b6-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation test.exe -
Executes dropped EXE 1 IoCs
pid Process 232 test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4048 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1932 wrote to memory of 232 1932 test.exe 89 PID 1932 wrote to memory of 232 1932 test.exe 89 PID 1932 wrote to memory of 232 1932 test.exe 89 PID 232 wrote to memory of 4048 232 test.exe 90 PID 232 wrote to memory of 4048 232 test.exe 90 PID 232 wrote to memory of 4048 232 test.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\XenoManager\test.exe"C:\Users\Admin\AppData\Roaming\XenoManager\test.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows defender security notification icon" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9625.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5d14add5bc544dc56500dab4dcc70f120
SHA1626a696608ee981a0e8d6bde221c0dcb961c2644
SHA256e549e2fef562f01fc2d18ba0b34521bb6f87ba4ca0dcfc82002c9dfcffa07ad0
SHA5123a19b6d12218a2e66dab2175098a392a8ec489711852a05542e3a156876fb1b0a0806ee5839741a196117d111ef5ea2a0562c7999eab3861f5f81ba9c03098db
-
Filesize
46KB
MD5550f478c2fc3b63c03f0ba77f5bc0ba3
SHA1d59302c72e40e9e59a9f3277193b45b6bfa9efd8
SHA2562e7a2d807698416a3fdcc5691770fab39a1ec738487328bae34f135c7ef25a05
SHA5123945fdbd052d8ecf586a5d4874a98fee76d27e2c00e6f4a9f118ca4e613d37403eaf36edb27897538806c434c73aae23f331c25e07fd7b596af7a8e2f0708eea