File name:

15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe

Full analysis: https://app.any.run/tasks/ce20a2fc-c450-424d-acfb-8c473aac93bd
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: August 25, 2024, 08:43:07
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
remote
xenorat
antivm
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

2B6F6836DB46F93418FADFDB93672FE5

SHA1:

27337907AA2D151CA7F8588EE9B6892E53585BB0

SHA256:

15B7A9A420C80D9E2609F3933A23B233DDB6B3A0A6D0F28A92A20D2016F36CD7

SSDEEP:

98304:j2C6JEgi+pLvqVXDmJ3AonGvGSzbp9QEKmXiSzlE6ywCzLXsoTUXe+MlrVV/pqkV:yLfi4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XenoRAT has been detected (FILE)

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6704)
      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
    • XENORAT has been detected (SURICATA)

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
    • Connects to the CnC server

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6704)
    • Reads security settings of Internet Explorer

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6704)
    • Executable content was dropped or overwritten

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6704)
    • Starts itself from another location

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6704)
    • Connects to unusual port

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
    • There is functionality for VM detection (VirtualBox)

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
    • There is functionality for taking screenshot (YARA)

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
    • Contacting a server suspected of hosting an CnC

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
  • INFO

    • Reads the computer name

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6704)
      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
    • Creates files or folders in the user directory

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6704)
    • Create files in a temporary directory

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6704)
      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
    • Checks supported languages

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6704)
      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
    • Reads the machine GUID from the registry

      • 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe (PID: 6980)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (61.6)
.dll | Win32 Dynamic Link Library (generic) (14.6)
.exe | Win32 Executable (generic) (10)
.exe | Win16/32 Executable Delphi generic (4.6)
.exe | Generic Win/DOS Executable (4.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2067:04:09 13:44:02+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 43520
InitializedDataSize: 2560
UninitializedDataSize: -
EntryPoint: 0x9b5b48
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.2.1.0
ProductVersionNumber: 1.2.3.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: MicrisoftⓇ
FileDescription: Хост-процесс для задач Windows
FileVersion: 3.2.1.0
InternalName: xeno rat client.exe
LegalCopyright: MicrisoftⓇWindowsⓇOperating System
LegalTrademarks: Хост-процесс для задач Windows
OriginalFileName: Хост-процесс для задач Windows.exe
ProductName: MicrisoftⓇWindowsⓇOperating System
ProductVersion: 1.2.3.0
AssemblyVersion: 1.2.3.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XENORAT 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe #XENORAT 15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe

Process information

PID
CMD
Path
Indicators
Parent process
6704"C:\Users\admin\Desktop\15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe" C:\Users\admin\Desktop\15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
explorer.exe
User:
admin
Company:
MicrisoftⓇ
Integrity Level:
MEDIUM
Description:
Хост-процесс для задач Windows
Exit code:
0
Version:
3.2.1.0
Modules
Images
c:\users\admin\desktop\15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6980"C:\Users\admin\AppData\Roaming\XenoManager\15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe" C:\Users\admin\AppData\Roaming\XenoManager\15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
User:
admin
Company:
MicrisoftⓇ
Integrity Level:
MEDIUM
Description:
Хост-процесс для задач Windows
Version:
3.2.1.0
Modules
Images
c:\users\admin\appdata\roaming\xenomanager\15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
7 840
Read events
7 840
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
670415b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exeC:\Users\admin\AppData\Roaming\XenoManager\15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exeexecutable
MD5:2B6F6836DB46F93418FADFDB93672FE5
SHA256:15B7A9A420C80D9E2609F3933A23B233DDB6B3A0A6D0F28A92A20D2016F36CD7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
17
DNS requests
4
Threats
17

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3308
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
188
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
178.214.236.32:6450
JSC Ufanet
RU
malicious
3308
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4324
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.74.206
whitelisted

Threats

PID
Process
Class
Message
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xeno-RAT TCP Connection
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xeno-RAT TCP Connection
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xeno-RAT TCP Connection
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
ET MALWARE [ANY.RUN] Xeno-RAT TCP Check-In
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xeno-RAT TCP Check-in Server Response
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xeno-RAT TCP Connection
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xeno-RAT TCP Connection
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xeno-RAT TCP Connection
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xeno-RAT TCP Connection
6980
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xeno-RAT TCP Connection
No debug info