Analysis

  • max time kernel
    102s
  • max time network
    104s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/04/2025, 11:36

General

  • Target

    Release.zip

  • Size

    6.4MB

  • MD5

    89661a9ff6de529497fec56a112bf75e

  • SHA1

    2dd31a19489f4d7c562b647f69117e31b894b5c3

  • SHA256

    e7b275d70655db9cb43fa606bbe2e4f22478ca4962bbf9f299d66eda567d63cd

  • SHA512

    33c765bf85fbec0e58924ece948b80a7d73b7577557eaac8865e481c61ad6b71f8b5b846026103239b3bd21f438ff0d7c1430a51a4a149f16a215faad6dab68f

  • SSDEEP

    196608:SYNI1S7C6S230UwVLW83FUSA7WQZzwM3/C2cM7m2:rNIs7CDvB1USA7WS/vcx2

Malware Config

Signatures

  • Detect XenoRat Payload 1 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 55 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Release.zip
    1⤵
      PID:4504
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1784
      • C:\Users\Admin\Documents\Release\xeno rat server.exe
        "C:\Users\Admin\Documents\Release\xeno rat server.exe"
        1⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4240

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Downloads\k.exe

        Filesize

        45KB

        MD5

        032fd55d35f58803b186bad983265947

        SHA1

        3bd6a1fab31cdc4e3e20b9d3e4617514ca731f7e

        SHA256

        5c14ee0fda73dc0aa35434f976f2c52b301abfea944729f33ec7ea189a9cb1f3

        SHA512

        f1bcbd7d93c193ffcc8bbafe5f86b83b94c4f51ea6a3582aef0785c5af911f2b3c0d26d5949f66baaa505a7cb88586e0c76093584792a146852bd4b04fc36e9f

      • memory/4240-10-0x00000000748E0000-0x0000000075091000-memory.dmp

        Filesize

        7.7MB

      • memory/4240-11-0x00000000748EE000-0x00000000748EF000-memory.dmp

        Filesize

        4KB

      • memory/4240-3-0x0000000005460000-0x00000000054F2000-memory.dmp

        Filesize

        584KB

      • memory/4240-0-0x00000000748EE000-0x00000000748EF000-memory.dmp

        Filesize

        4KB

      • memory/4240-5-0x00000000748E0000-0x0000000075091000-memory.dmp

        Filesize

        7.7MB

      • memory/4240-6-0x0000000007D80000-0x0000000007D94000-memory.dmp

        Filesize

        80KB

      • memory/4240-7-0x0000000007E50000-0x0000000007E6A000-memory.dmp

        Filesize

        104KB

      • memory/4240-8-0x0000000007E70000-0x0000000007E82000-memory.dmp

        Filesize

        72KB

      • memory/4240-2-0x0000000005BA0000-0x0000000006146000-memory.dmp

        Filesize

        5.6MB

      • memory/4240-9-0x0000000009D70000-0x0000000009D92000-memory.dmp

        Filesize

        136KB

      • memory/4240-4-0x0000000005430000-0x000000000543A000-memory.dmp

        Filesize

        40KB

      • memory/4240-12-0x00000000748E0000-0x0000000075091000-memory.dmp

        Filesize

        7.7MB

      • memory/4240-13-0x00000000066E0000-0x0000000006792000-memory.dmp

        Filesize

        712KB

      • memory/4240-14-0x0000000008B20000-0x0000000008E77000-memory.dmp

        Filesize

        3.3MB

      • memory/4240-16-0x00000000748E0000-0x0000000075091000-memory.dmp

        Filesize

        7.7MB

      • memory/4240-17-0x0000000009280000-0x00000000093A4000-memory.dmp

        Filesize

        1.1MB

      • memory/4240-18-0x00000000081B0000-0x00000000081CA000-memory.dmp

        Filesize

        104KB

      • memory/4240-1-0x0000000000770000-0x0000000000972000-memory.dmp

        Filesize

        2.0MB

      • memory/4240-36-0x00000000748E0000-0x0000000075091000-memory.dmp

        Filesize

        7.7MB