Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
fac2b832bf5760029b85f50ce606ec0f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fac2b832bf5760029b85f50ce606ec0f.exe
Resource
win10v2004-20231215-en
General
-
Target
fac2b832bf5760029b85f50ce606ec0f.exe
-
Size
1.9MB
-
MD5
fac2b832bf5760029b85f50ce606ec0f
-
SHA1
6b6dc9e35c8ea4062c6938bce9822be61ccd453f
-
SHA256
e43f4232dc9fe94ebf0a6832deaeaaaa1ce57275505ac927f0987e5fbf5b9d3e
-
SHA512
66f86f5a4e980d4fb22bc4dbc820a6393892ecb703d79e8b4ec875df89f2a278c45bf3b992f0703b617aedba9ca011258496d41946822cb6f3de3b2c29169c40
-
SSDEEP
49152:A60RDKhYJi03xASIT1c2JahWwcAsyRTHOR8hDWBABn0L5:A9RDfJLhASITi2IDsyM+hYG09
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 XenonPortable_1.5.0.1.paf.exe -
Loads dropped DLL 6 IoCs
pid Process 1852 fac2b832bf5760029b85f50ce606ec0f.exe 2064 XenonPortable_1.5.0.1.paf.exe 2064 XenonPortable_1.5.0.1.paf.exe 2064 XenonPortable_1.5.0.1.paf.exe 2064 XenonPortable_1.5.0.1.paf.exe 2064 XenonPortable_1.5.0.1.paf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fac2b832bf5760029b85f50ce606ec0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000c00000001225b-4.dat nsis_installer_1 behavioral1/files/0x000c00000001225b-4.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2064 XenonPortable_1.5.0.1.paf.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2064 1852 fac2b832bf5760029b85f50ce606ec0f.exe 28 PID 1852 wrote to memory of 2064 1852 fac2b832bf5760029b85f50ce606ec0f.exe 28 PID 1852 wrote to memory of 2064 1852 fac2b832bf5760029b85f50ce606ec0f.exe 28 PID 1852 wrote to memory of 2064 1852 fac2b832bf5760029b85f50ce606ec0f.exe 28 PID 1852 wrote to memory of 2064 1852 fac2b832bf5760029b85f50ce606ec0f.exe 28 PID 1852 wrote to memory of 2064 1852 fac2b832bf5760029b85f50ce606ec0f.exe 28 PID 1852 wrote to memory of 2064 1852 fac2b832bf5760029b85f50ce606ec0f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fac2b832bf5760029b85f50ce606ec0f.exe"C:\Users\Admin\AppData\Local\Temp\fac2b832bf5760029b85f50ce606ec0f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XenonPortable_1.5.0.1.paf.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XenonPortable_1.5.0.1.paf.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
629B
MD57218532107f49f6f9c6001b09fc93231
SHA1d6e1c9ee7c5dacac795fd0a7f481d5483f2d7b30
SHA25625e251a94e2843532c03b2afd2b6a524ddcf72a5977f05b22847851e5431093a
SHA512d78876c7a94ce3937a078521285ab84475f1fb1c2d868cbe1599b3aade74fd61475803250a57c0f844a754ad36a3dedf036a1774b94025b99682dee661f356f2
-
Filesize
668B
MD5e2ae5a4ca1e876fd469c1698f0047636
SHA1212dc80890e894661af7ec32c984161359bf4fa6
SHA2562681679e2b4d463e44deb3a804646ea222e667e6a4ec654ce38b3435709d9a83
SHA512162dd917af3bac15124cb308c7723fe8b7becb7bdedd109bc2cdb601394cbadcfcae81a27520767a9bec9fcd909ef42c610667750a8d8c9925c1463d104a8d96
-
Filesize
1.9MB
MD5f0616e00157533ef81c14a3cfcfaa272
SHA10bc0d0ada912f653d0d7caa7f08167daf7107950
SHA25631a843353ca0c3f687d8dda69995c36ad9608a95a2e496ab6e8cedd932e7b3b0
SHA512134dcd072e387714a0f0cbe0f7a9231d2e9b287ec5d3526262dade8d83172df99327ede60729e4ec853d1f970ccf2ccb43fff8f59858bef0a43b5329c09d1935
-
Filesize
14KB
MD50dc0cc7a6d9db685bf05a7e5f3ea4781
SHA15d8b6268eeec9d8d904bc9d988a4b588b392213f
SHA2568e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
SHA512814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0
-
Filesize
5KB
MD5a401e590877ef6c928d2a97c66157094
SHA175e24799cf67e789fadcc8b7fddefc72fdc4cd61
SHA2562a7f33ef64d666a42827c4dc377806ad97bc233819197adf9696aed5be5efac0
SHA5126093415cd090e69cdcb52b5d381d0a8b3e9e5479dac96be641e0071f1add26403b27a453febd8ccfd16393dc1caa03404a369c768a580781aba3068415ee993f
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667