Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 03:48
General
-
Target
fn.exe
-
Size
45KB
-
MD5
224ccb2529301b657df7c6bcc7ac6613
-
SHA1
1743e1b819c6a20ec5b8db1024a4f460160419e7
-
SHA256
7d5ff178c46801beba098d2705798c99392e15dbc9ccdef3e11ed737d9dfb93d
-
SHA512
c09509172cb3a662ba8cf5b1df1a4c45dc014c59388f219ed819e08890bd522e4c367e46e91740c1cf636f419e30b66f7022a23216a108e3132905a4ca319307
-
SSDEEP
768:FdhO/poiiUcjlJInbzH9Xqk5nWEZ5SbTDagWI7CPW5N:bw+jjgn3H9XqcnW85SbTpWIl
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
10
-
install_path
temp
-
port
4444
-
startup_name
fortnite
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/1216-1-0x0000000000750000-0x0000000000762000-memory.dmp family_xenorat behavioral1/files/0x0008000000024362-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation fn.exe -
Executes dropped EXE 1 IoCs
pid Process 5896 fn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5988 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1216 wrote to memory of 5896 1216 fn.exe 88 PID 1216 wrote to memory of 5896 1216 fn.exe 88 PID 1216 wrote to memory of 5896 1216 fn.exe 88 PID 5896 wrote to memory of 5988 5896 fn.exe 89 PID 5896 wrote to memory of 5988 5896 fn.exe 89 PID 5896 wrote to memory of 5988 5896 fn.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fn.exe"C:\Users\Admin\AppData\Local\Temp\fn.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\fn.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\fn.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5896 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "fortnite" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7AAE.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5988
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD5224ccb2529301b657df7c6bcc7ac6613
SHA11743e1b819c6a20ec5b8db1024a4f460160419e7
SHA2567d5ff178c46801beba098d2705798c99392e15dbc9ccdef3e11ed737d9dfb93d
SHA512c09509172cb3a662ba8cf5b1df1a4c45dc014c59388f219ed819e08890bd522e4c367e46e91740c1cf636f419e30b66f7022a23216a108e3132905a4ca319307
-
Filesize
1KB
MD543f3fce8a4898ffc362d0ad83c108978
SHA1e76099d46f3fc12376dd3ca421ef89de4c94b6ec
SHA256b5ae21bab93936c4e32e82028139b93b0dceb39a5bd66b7b2e538ed45b8c7870
SHA5129e08ea4a0d6e3ea20b10521fda6f262d0e4837114bfa09a07c0ca449f762bfaf30e991a292a38805b0b700f59ada964f5d64b4f1e596a49d322d45c50a0db585