Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8q8C8bQJRZ.exe

Overview

General Information

Sample name:8q8C8bQJRZ.exe
renamed because original name is a hash value
Original sample name:8b41a4fe26ea38b13ea25ac063f72855e170449f20ec8153a5d1d9068089392b.exe
Analysis ID:1617090
MD5:11b40b4a6a1c3da4854eb344056ab5ba
SHA1:a644f5bd41ea350d37754f3f01e81313e89d2551
SHA256:8b41a4fe26ea38b13ea25ac063f72855e170449f20ec8153a5d1d9068089392b
Tags:176-65-139-51exeuser-JAMESWT_MHT
Infos:

Detection

XenoRAT
Score:84
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected XenoRAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Joe Sandbox ML detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 8q8C8bQJRZ.exe (PID: 3868 cmdline: "C:\Users\user\Desktop\8q8C8bQJRZ.exe" MD5: 11B40B4A6A1C3DA4854EB344056AB5BA)
  • cleanup
{"C2 url": "176.65.139.51", "Mutex Name": "Xeno_rat_nd8912d", "Install Folder": "nothingset"}
SourceRuleDescriptionAuthorStrings
8q8C8bQJRZ.exeJoeSecurity_XenoRATYara detected XenoRATJoe Security
    8q8C8bQJRZ.exerat_win_xeno_ratXeno RAT is an open-source RAT, used by Kimsuky in January 2024Sekoia.io
    • 0xb14c:$: Xeno-manager
    • 0x250:$: moom825
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1804936159.0000000000782000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XenoRATYara detected XenoRATJoe Security
      Process Memory Space: 8q8C8bQJRZ.exe PID: 3868JoeSecurity_XenoRATYara detected XenoRATJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.8q8C8bQJRZ.exe.780000.0.unpackJoeSecurity_XenoRATYara detected XenoRATJoe Security
          0.0.8q8C8bQJRZ.exe.780000.0.unpackrat_win_xeno_ratXeno RAT is an open-source RAT, used by Kimsuky in January 2024Sekoia.io
          • 0xb14c:$: Xeno-manager
          • 0x250:$: moom825
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 8q8C8bQJRZ.exeMalware Configuration Extractor: XenoRAT {"C2 url": "176.65.139.51", "Mutex Name": "Xeno_rat_nd8912d", "Install Folder": "nothingset"}
          Source: 8q8C8bQJRZ.exeVirustotal: Detection: 70%Perma Link
          Source: 8q8C8bQJRZ.exeReversingLabs: Detection: 75%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
          Source: 8q8C8bQJRZ.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Malware configuration extractorURLs: 176.65.139.51
          Source: global trafficTCP traffic: 192.168.2.4:49731 -> 176.65.139.51:6969
          Source: Joe Sandbox ViewASN Name: PALTEL-ASPALTELAutonomousSystemPS PALTEL-ASPALTELAutonomousSystemPS
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51
          Source: unknownTCP traffic detected without corresponding DNS query: 176.65.139.51

          System Summary

          barindex
          Source: 8q8C8bQJRZ.exe, type: SAMPLEMatched rule: Xeno RAT is an open-source RAT, used by Kimsuky in January 2024 Author: Sekoia.io
          Source: 0.0.8q8C8bQJRZ.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: Xeno RAT is an open-source RAT, used by Kimsuky in January 2024 Author: Sekoia.io
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeCode function: 0_2_00E023270_2_00E02327
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeCode function: 0_2_00E00B110_2_00E00B11
          Source: 8q8C8bQJRZ.exe, 00000000.00000000.1804953226.000000000078E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesys64.exe: vs 8q8C8bQJRZ.exe
          Source: 8q8C8bQJRZ.exe, 00000000.00000002.3052855401.0000000000ECE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 8q8C8bQJRZ.exe
          Source: 8q8C8bQJRZ.exeBinary or memory string: OriginalFilenamesys64.exe: vs 8q8C8bQJRZ.exe
          Source: 8q8C8bQJRZ.exe, type: SAMPLEMatched rule: rat_win_xeno_rat author = Sekoia.io, description = Xeno RAT is an open-source RAT, used by Kimsuky in January 2024, creation_date = 2024-02-09, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/moom825/xeno-rat/tree/main/xeno%20rat%20client, id = 4be1ff07-8180-42a8-9f51-b5e17bf23442
          Source: 0.0.8q8C8bQJRZ.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_xeno_rat author = Sekoia.io, description = Xeno RAT is an open-source RAT, used by Kimsuky in January 2024, creation_date = 2024-02-09, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/moom825/xeno-rat/tree/main/xeno%20rat%20client, id = 4be1ff07-8180-42a8-9f51-b5e17bf23442
          Source: classification engineClassification label: mal84.troj.evad.winEXE@1/0@0/1
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeMutant created: NULL
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeMutant created: \Sessions\1\BaseNamedObjects\Xeno_rat_nd8912d-admin
          Source: 8q8C8bQJRZ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 8q8C8bQJRZ.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 8q8C8bQJRZ.exeVirustotal: Detection: 70%
          Source: 8q8C8bQJRZ.exeReversingLabs: Detection: 75%
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSection loaded: mswsock.dllJump to behavior
          Source: 8q8C8bQJRZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 8q8C8bQJRZ.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: 8q8C8bQJRZ.exe, DllHandler.cs.Net Code: DllNodeHandler System.Reflection.Assembly.Load(byte[])
          Source: 8q8C8bQJRZ.exe, DllHandler.cs.Net Code: DllNodeHandler
          Source: 8q8C8bQJRZ.exeStatic PE information: 0xB6F61BA2 [Sat Apr 9 13:44:02 2067 UTC]
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeCode function: 0_2_00E036D7 push ebx; iretd 0_2_00E036DA
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeMemory allocated: E00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeMemory allocated: 2A60000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeWindow / User API: threadDelayed 2433Jump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeWindow / User API: threadDelayed 7419Jump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe TID: 6440Thread sleep time: -27670116110564310s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe TID: 4296Thread sleep count: 2433 > 30Jump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe TID: 1020Thread sleep count: 7419 > 30Jump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: 8q8C8bQJRZ.exe, 00000000.00000002.3052855401.0000000000F33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeQueries volume information: C:\Users\user\Desktop\8q8C8bQJRZ.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\8q8C8bQJRZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 8q8C8bQJRZ.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.8q8C8bQJRZ.exe.780000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1804936159.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 8q8C8bQJRZ.exe PID: 3868, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 8q8C8bQJRZ.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.8q8C8bQJRZ.exe.780000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1804936159.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 8q8C8bQJRZ.exe PID: 3868, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Obfuscated Files or Information
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Software Packing
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Timestomp
          LSA Secrets12
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          8q8C8bQJRZ.exe70%VirustotalBrowse
          8q8C8bQJRZ.exe76%ReversingLabsByteCode-MSIL.Backdoor.XenoRAT
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          176.65.139.510%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          176.65.139.51true
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          176.65.139.51
          unknownGermany
          12975PALTEL-ASPALTELAutonomousSystemPStrue
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1617090
          Start date and time:2025-02-17 14:00:10 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 3m 59s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:8q8C8bQJRZ.exe
          renamed because original name is a hash value
          Original Sample Name:8b41a4fe26ea38b13ea25ac063f72855e170449f20ec8153a5d1d9068089392b.exe
          Detection:MAL
          Classification:mal84.troj.evad.winEXE@1/0@0/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 5
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45, 52.149.20.212
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          TimeTypeDescription
          08:01:41API Interceptor171x Sleep call for process: 8q8C8bQJRZ.exe modified
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          PALTEL-ASPALTELAutonomousSystemPSShippingdocumentsAwbBLInv0000000pdf.vbsGet hashmaliciousUnknownBrowse
          • 176.65.138.184
          Hesap Hareketleri 17-02-2025.exeGet hashmaliciousCryptOne, RemcosBrowse
          • 176.65.144.154
          uYtea.x86.elfGet hashmaliciousUnknownBrowse
          • 176.65.137.13
          uYtea.arm7.elfGet hashmaliciousMiraiBrowse
          • 176.65.137.13
          uYtea.arm.elfGet hashmaliciousUnknownBrowse
          • 176.65.137.13
          res.spc.elfGet hashmaliciousUnknownBrowse
          • 213.244.67.102
          Client.exeGet hashmaliciousKeyLogger, StormKitty, VenomRATBrowse
          • 176.65.137.182
          Client.exeGet hashmaliciousKeyLogger, StormKitty, VenomRATBrowse
          • 176.65.137.182
          7BU8LCQLmc.ps1Get hashmaliciousKeyLogger, StormKitty, VenomRATBrowse
          • 176.65.137.182
          7BU8LCQLmc.ps1Get hashmaliciousKeyLogger, StormKitty, VenomRATBrowse
          • 176.65.137.182
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):5.643250727908704
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          • Win32 Executable (generic) a (10002005/4) 49.78%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:8q8C8bQJRZ.exe
          File size:46'592 bytes
          MD5:11b40b4a6a1c3da4854eb344056ab5ba
          SHA1:a644f5bd41ea350d37754f3f01e81313e89d2551
          SHA256:8b41a4fe26ea38b13ea25ac063f72855e170449f20ec8153a5d1d9068089392b
          SHA512:75c4a08b268391c7e1e2748be7f0dda25c93e088f255386764c3c07e07421ed8143ef428408362b8575312ead0a1ccfda354766ba9bdafbc0619e7e0282687b2
          SSDEEP:768:EdhO/poiiUcjlJInCFH9Xqk5nWEZ5SbTDaYWI7CPW5K:ew+jjgnyH9XqcnW85SbTxWIC
          TLSH:6B23E74C57AC8923E6AF5ABD98324263C7B3E3669532E38F08CCD4E9379338555053A7
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ........@.. ....................... ............`................................
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x40cb0e
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0xB6F61BA2 [Sat Apr 9 13:44:02 2067 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xcab40x57.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x5c0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000xab140xac00a07ced22202afd312f072d56b4ab900aFalse0.44953670058139533data5.72558660548345IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0xe0000x5c00x6002ac195bea41bf9e2b3f0a8469c7762cfFalse0.4537760416666667data4.443358122135941IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x100000xc0x20001acd2af66a5901a5067e09bcf43dbb2False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_VERSION0xe0a00x334data0.4609756097560976
          RT_MANIFEST0xe3d40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
          DLLImport
          mscoree.dll_CorExeMain
          DescriptionData
          Translation0x0000 0x04b0
          Comments
          CompanyNameXeno
          FileDescriptionClient
          FileVersion3.2.1.0
          InternalNamexeno rat client.exe
          LegalCopyrightCopyright 2023
          LegalTrademarksXeno
          OriginalFilenamesys64.exe
          ProductNameXeno-manager
          ProductVersion1.2.3.0
          Assembly Version1.2.3.0
          TimestampSource PortDest PortSource IPDest IP
          Feb 17, 2025 14:01:21.416716099 CET497316969192.168.2.4176.65.139.51
          Feb 17, 2025 14:01:21.421788931 CET696949731176.65.139.51192.168.2.4
          Feb 17, 2025 14:01:21.421919107 CET497316969192.168.2.4176.65.139.51
          Feb 17, 2025 14:01:42.804905891 CET696949731176.65.139.51192.168.2.4
          Feb 17, 2025 14:01:42.805016041 CET497316969192.168.2.4176.65.139.51
          Feb 17, 2025 14:01:52.815555096 CET497386969192.168.2.4176.65.139.51
          Feb 17, 2025 14:01:52.820415020 CET696949738176.65.139.51192.168.2.4
          Feb 17, 2025 14:01:52.820503950 CET497386969192.168.2.4176.65.139.51
          Feb 17, 2025 14:02:14.176474094 CET696949738176.65.139.51192.168.2.4
          Feb 17, 2025 14:02:14.176563978 CET497386969192.168.2.4176.65.139.51
          Feb 17, 2025 14:02:24.194700956 CET498876969192.168.2.4176.65.139.51
          Feb 17, 2025 14:02:24.199573040 CET696949887176.65.139.51192.168.2.4
          Feb 17, 2025 14:02:24.199696064 CET498876969192.168.2.4176.65.139.51
          Feb 17, 2025 14:02:45.573882103 CET696949887176.65.139.51192.168.2.4
          Feb 17, 2025 14:02:45.574037075 CET498876969192.168.2.4176.65.139.51
          Feb 17, 2025 14:02:55.580845118 CET500066969192.168.2.4176.65.139.51
          Feb 17, 2025 14:02:55.588046074 CET696950006176.65.139.51192.168.2.4
          Feb 17, 2025 14:02:55.588174105 CET500066969192.168.2.4176.65.139.51
          Feb 17, 2025 14:03:16.976684093 CET696950006176.65.139.51192.168.2.4
          Feb 17, 2025 14:03:16.976825953 CET500066969192.168.2.4176.65.139.51

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:08:01:14
          Start date:17/02/2025
          Path:C:\Users\user\Desktop\8q8C8bQJRZ.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\8q8C8bQJRZ.exe"
          Imagebase:0x780000
          File size:46'592 bytes
          MD5 hash:11B40B4A6A1C3DA4854EB344056AB5BA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_XenoRAT, Description: Yara detected XenoRAT, Source: 00000000.00000000.1804936159.0000000000782000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
          Reputation:low
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:19.6%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:9.7%
            Total number of Nodes:31
            Total number of Limit Nodes:1
            execution_graph 2383 e00848 2386 e00877 2383->2386 2387 e008c9 2386->2387 2391 e00908 2387->2391 2396 e008f9 2387->2396 2388 e00857 2392 e00931 2391->2392 2401 e00b11 2392->2401 2405 e00c9a 2392->2405 2393 e0094b 2397 e00931 2396->2397 2399 e00b11 KiUserExceptionDispatcher 2397->2399 2400 e00c9a KiUserExceptionDispatcher 2397->2400 2398 e0094b 2398->2398 2399->2398 2400->2398 2402 e00b4a 2401->2402 2403 e00d0c 2402->2403 2409 e03d48 2402->2409 2403->2393 2406 e00ca2 2405->2406 2407 e03d48 KiUserExceptionDispatcher 2406->2407 2408 e00d0c 2406->2408 2407->2406 2408->2393 2410 e03d8b 2409->2410 2413 e03dc8 2410->2413 2414 e03df9 KiUserExceptionDispatcher 2413->2414 2416 e03e28 2414->2416 2417 e00839 2418 e00857 2417->2418 2419 e00877 KiUserExceptionDispatcher 2417->2419 2419->2418 2424 e011ed 2426 e00f4c 2424->2426 2425 e010a4 2426->2425 2427 e03d48 KiUserExceptionDispatcher 2426->2427 2427->2426

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 6 e00b11-e00b48 7 e00b51-e00ba6 call e007d4 6->7 8 e00b4a 6->8 147 e00ba6 call e013b0 7->147 148 e00ba6 call e013a1 7->148 8->7 9 e00d44-e00d68 8->9 10 e00f04-e00f28 8->10 11 e00e3f-e00e63 8->11 13 e00d6f-e00d7f 9->13 12 e00f2f-e00f3f 10->12 15 e00e6a-e00e7a 11->15 18 e00f41 12->18 19 e00f46-e00f49 12->19 20 e00d81 13->20 21 e00d86-e00d8d 13->21 16 e00e81-e00e87 15->16 17 e00e7c 15->17 22 e00f4c-e00f5d 16->22 17->16 18->19 19->22 20->21 21->22 23 e00d93-e00da6 21->23 25 e00f66-e00fa0 22->25 26 e00f5f 22->26 37 e00da8-e00dae 23->37 38 e00db9-e00dc1 23->38 65 e00fa8-e00fc7 25->65 29 e011b0-e011d4 26->29 30 e010e6-e0110a 26->30 31 e0100a-e0102e 26->31 33 e011db-e01214 29->33 36 e01111-e01150 call e03d48 30->36 34 e01035-e01043 31->34 51 e012f3-e012fa 33->51 52 e0121a-e01221 33->52 49 e01045 34->49 50 e0104c-e0107f 34->50 87 e01156-e01171 36->87 37->38 45 e00dc7-e00e03 38->45 46 e00e8c-e00ec8 38->46 45->15 81 e00e05-e00e3a 45->81 46->12 82 e00eca-e00eff 46->82 49->50 145 e01081 call e01f07 50->145 146 e01081 call e01f08 50->146 51->22 61 e0133f-e01346 51->61 58 e01223-e01229 52->58 59 e0123b-e0126b 52->59 63 e0122b 58->63 64 e0122d-e01239 58->64 94 e0126d-e0129e 59->94 95 e012ce-e012f0 59->95 63->59 64->59 65->34 71 e00fc9-e01005 65->71 71->31 71->61 79 e01087-e010a2 79->36 97 e010a4-e010e1 79->97 81->61 82->61 85 e00bac-e00bae 90 e00bb0-e00bc1 85->90 91 e00bcc-e00bdf 85->91 87->33 110 e01173-e011ab 87->110 90->91 102 e00ca2-e00cc8 call e0014c 91->102 103 e00be5-e00c1b 91->103 94->61 95->51 97->61 118 e01325-e01337 102->118 119 e00cce-e00d0a 102->119 103->102 126 e00c21-e00c40 103->126 110->61 118->61 119->13 124 e00d0c-e00d36 119->124 143 e00d39 call e014a0 124->143 144 e00d39 call e0149d 124->144 132 e00c42 126->132 133 e00c49-e00c98 126->133 129 e00d3f 129->61 132->133 133->102 143->129 144->129 145->79 146->79 147->85 148->85
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3052715042.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e00000_8q8C8bQJRZ.jbxd
            Similarity
            • API ID:
            • String ID: dhq
            • API String ID: 0-2324836203
            • Opcode ID: 18be32fad2aa5936c9ebd83773abee66f67044de4b5e15f02168fe2a6245cccb
            • Instruction ID: 43ff989423db8f8daed74a920210de645d180f9c9d09ae1d04978bd345d95056
            • Opcode Fuzzy Hash: 18be32fad2aa5936c9ebd83773abee66f67044de4b5e15f02168fe2a6245cccb
            • Instruction Fuzzy Hash: B6420974A002498FCB05DFA8D584A9DBBF2BF49314F1585A9E409EF3A9DB30AD85CF50

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 150 e02327-e0235a 151 e02387-e0238d 150->151 152 e0235c-e0237f 150->152 153 e02396-e023b2 151->153 154 e0238f 151->154 152->151 222 e023b4 call e02858 153->222 223 e023b4 call e0283d 153->223 154->153 156 e02402-e0241c 154->156 157 e02492-e024ac 154->157 158 e026b2-e026cc 154->158 159 e025f9-e02613 154->159 160 e0252f-e02549 154->160 165 e02423-e02433 156->165 162 e024b3-e024c3 157->162 163 e026d3-e026e3 158->163 164 e0261a-e0262a 159->164 161 e02550-e02560 160->161 167 e02562 161->167 168 e02567-e02590 161->168 169 e024c5 162->169 170 e024ca-e024d1 162->170 171 e026e5 163->171 172 e026ea-e02702 163->172 173 e02631-e02638 164->173 174 e0262c 164->174 175 e02435 165->175 176 e0243a-e02447 call e03978 165->176 167->168 196 e027dc-e027de 168->196 199 e02596-e025c4 168->199 169->170 177 e024d3-e024d5 170->177 178 e024da-e024f5 170->178 171->172 189 e027c7-e027d5 172->189 179 e02641-e02648 173->179 180 e0263a-e0263c 173->180 174->173 175->176 185 e0244d-e0245d 176->185 186 e02804-e02817 177->186 178->161 197 e024f7-e0252a 178->197 187 e02707-e0274d 179->187 188 e0264e-e02678 179->188 180->186 181 e023ba-e023ca 181->165 182 e023cc-e023fd 181->182 192 e0281f-e02826 182->192 185->162 191 e0245f-e0248d 185->191 186->192 207 e027a3-e027b3 187->207 208 e0274f-e0277d 187->208 188->163 200 e0267a-e026ad 188->200 189->186 189->196 191->192 196->186 197->192 199->164 217 e025c6-e025f4 199->217 200->192 210 e027b5 207->210 211 e027ba-e027c1 207->211 208->192 208->207 210->211 211->189 214 e027c3-e027c5 211->214 214->186 217->192 222->181 223->181
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3052715042.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e00000_8q8C8bQJRZ.jbxd
            Similarity
            • API ID:
            • String ID: P x
            • API String ID: 0-1487350286
            • Opcode ID: 86f6e3a14c69e71066e50f47129fec9d3f9e8af033832790a440d3cee7d370d0
            • Instruction ID: 827108730eadc3b80366fbce8922c92664935465f4a31415add10996645f9d9d
            • Opcode Fuzzy Hash: 86f6e3a14c69e71066e50f47129fec9d3f9e8af033832790a440d3cee7d370d0
            • Instruction Fuzzy Hash: C0F1D474A012459FDB05CF68D488A9DBBF2BF49324F1581A9E509EB3A6D730EC85CF60

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 e03dc8-e03e26 KiUserExceptionDispatcher 4 e03e28-e03e30 0->4
            APIs
            • KiUserExceptionDispatcher.NTDLL ref: 00E03E0D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3052715042.0000000000E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e00000_8q8C8bQJRZ.jbxd
            Similarity
            • API ID: DispatcherExceptionUser
            • String ID: .
            • API String ID: 6842923-362474954
            • Opcode ID: b5eff56af7048f5f7f498f050b7c7ef53011b0131636d7d0e36a8f6446bb0377
            • Instruction ID: 6386be6855f5d4e20c656db5234b74de44954185143c8026e5d7caed7f770fed
            • Opcode Fuzzy Hash: b5eff56af7048f5f7f498f050b7c7ef53011b0131636d7d0e36a8f6446bb0377
            • Instruction Fuzzy Hash: 43F02472E102099BCF15D774C4559EFBFB24F84300F01893AC802F7280EEB0290B96C2
            Memory Dump Source
            • Source File: 00000000.00000002.3052529810.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_d6d000_8q8C8bQJRZ.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d6c6456a96cb1a2716427479441f09ec23868f89b9418982f71d47fa0ef30047
            • Instruction ID: 37a22f8fc5291495836ef35b7845b71ff50e7dddb8729dc09609ce06641b0ab1
            • Opcode Fuzzy Hash: d6c6456a96cb1a2716427479441f09ec23868f89b9418982f71d47fa0ef30047
            • Instruction Fuzzy Hash: 0801F771A083449BE7208B29DC84B26FFE9DF61321F1CC51AEC490E282C2359841C6B1
            Memory Dump Source
            • Source File: 00000000.00000002.3052529810.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_d6d000_8q8C8bQJRZ.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 162362725b3347b2815733554c7143a32e70955b3edd3ed369dd4b779ec3a415
            • Instruction ID: a4de089d13c2be6442bfae6df4c23623ec3837d9ad6b5a39d78623b7ca527700
            • Opcode Fuzzy Hash: 162362725b3347b2815733554c7143a32e70955b3edd3ed369dd4b779ec3a415
            • Instruction Fuzzy Hash: 9BF062715043449FE7108B1ADD84B62FFD8EB91734F18C45AED094E287C2799845CAB1