Analysis
-
max time kernel
889s -
max time network
563s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
31/03/2025, 11:21
Behavioral task
behavioral1
Sample
test.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
test.exe
-
Size
45KB
-
MD5
8ceb64cc59a9058d04369683f86ce999
-
SHA1
dd5e95e984ecef5bb8cc6ee9e31c126258d3cb5f
-
SHA256
de7da4f5c8b8942318916678952ea507aff5ace98e71f5bb7f49e18354810833
-
SHA512
c5a56496a3d7a9ec94f2893d46f0487ce2b3b4bb83072cd46fe94af9e89e0f4e6d35813e007a010b5759647fbfa8873e9f1d70e0ce9097c2215b25aa341c5992
-
SSDEEP
768:pdhO/poiiUcjlJInuC2H9Xqk5nWEZ5SbTDaSuI7CPW5La:nw+jjgnP2H9XqcnW85SbT3uIja
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
system32
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/5872-1-0x0000000000A80000-0x0000000000A92000-memory.dmp family_xenorat behavioral1/files/0x0007000000028189-2.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000\Control Panel\International\Geo\Nation test.exe -
Executes dropped EXE 1 IoCs
pid Process 3040 test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4608 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5872 wrote to memory of 3040 5872 test.exe 81 PID 5872 wrote to memory of 3040 5872 test.exe 81 PID 5872 wrote to memory of 3040 5872 test.exe 81 PID 3040 wrote to memory of 4608 3040 test.exe 86 PID 3040 wrote to memory of 4608 3040 test.exe 86 PID 3040 wrote to memory of 4608 3040 test.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5872 -
C:\Users\Admin\AppData\Roaming\XenoManager\test.exe"C:\Users\Admin\AppData\Roaming\XenoManager\test.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "system32" /XML "C:\Users\Admin\AppData\Local\Temp\tmp53EC.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD566aea5e724c4a224d092067c3381783b
SHA1ee3cc64c4370a255391bdfeef2883d5b7a6e6230
SHA25604b17cab961f973464bba8924f764edef6451d1774f2405d27ef33d164296923
SHA5125d719e303f491d1443cb7c7e8946481e90532522a422c98f82466e1eddcd1ef24a4505dcbf75f2191fbb66825d3550566d7f408a3854edeb4c1a192c8c9a6d06
-
Filesize
1KB
MD5d14add5bc544dc56500dab4dcc70f120
SHA1626a696608ee981a0e8d6bde221c0dcb961c2644
SHA256e549e2fef562f01fc2d18ba0b34521bb6f87ba4ca0dcfc82002c9dfcffa07ad0
SHA5123a19b6d12218a2e66dab2175098a392a8ec489711852a05542e3a156876fb1b0a0806ee5839741a196117d111ef5ea2a0562c7999eab3861f5f81ba9c03098db
-
Filesize
45KB
MD58ceb64cc59a9058d04369683f86ce999
SHA1dd5e95e984ecef5bb8cc6ee9e31c126258d3cb5f
SHA256de7da4f5c8b8942318916678952ea507aff5ace98e71f5bb7f49e18354810833
SHA512c5a56496a3d7a9ec94f2893d46f0487ce2b3b4bb83072cd46fe94af9e89e0f4e6d35813e007a010b5759647fbfa8873e9f1d70e0ce9097c2215b25aa341c5992