Analysis

  • max time kernel
    138s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    31/03/2025, 11:36

General

  • Target

    582392.exe

  • Size

    45KB

  • MD5

    c860dbba55d2b9a69e9f8f768ae7aed7

  • SHA1

    7ce0a9b4e46e0fb0c01cb1d935403f8e4e0bcd0d

  • SHA256

    5f1d0c1090976094d07e191815db1eeaaa7ed51fd17d49f935d52927d0ab2dc6

  • SHA512

    8a262260ba2ce648fa1a92dd2b8d9f8e4eb62af8b1c4c8ca23c1c8a83a8824cb149a1d93ad967dba8d6b10cb8a544afcc2f114bc9c14db34ca1e75d709c626ed

  • SSDEEP

    768:RdhO/poiiUcjlJInUvH9Xqk5nWEZ5SbTDaJWI7CPW5M:Pw+jjgnOH9XqcnW85SbTAWIk

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    58239

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 1 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\582392.exe
    "C:\Users\Admin\AppData\Local\Temp\582392.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:804
  • C:\Windows\system32\BackgroundTransferHost.exe
    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
    1⤵
    • Modifies registry class
    PID:3084
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\00306a47-378c-49b7-9a8b-59569d37527b.down_data

    Filesize

    555KB

    MD5

    5683c0028832cae4ef93ca39c8ac5029

    SHA1

    248755e4e1db552e0b6f8651b04ca6d1b31a86fb

    SHA256

    855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

    SHA512

    aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

  • memory/804-0-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

    Filesize

    4KB

  • memory/804-1-0x0000000000820000-0x0000000000832000-memory.dmp

    Filesize

    72KB

  • memory/804-2-0x0000000074ED0000-0x0000000075681000-memory.dmp

    Filesize

    7.7MB

  • memory/804-3-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

    Filesize

    4KB

  • memory/804-4-0x0000000074ED0000-0x0000000075681000-memory.dmp

    Filesize

    7.7MB