Analysis
-
max time kernel
41s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-04-2024 06:02
Behavioral task
behavioral1
Sample
SysUpd.exe
Resource
win7-20240221-en
General
-
Target
SysUpd.exe
-
Size
45KB
-
MD5
0c0a54e961d1aead20b9c4a75b3723d4
-
SHA1
9a87e7e509175d096477c8d3f2e3bed94f8d646a
-
SHA256
3ac1adc75ac38013eb7f2aa103c624b7ef5a628333b929841c043890aee42b79
-
SHA512
c9ffbbcc79198dbb3439976ec1e19c7a01bebd9e74af0a87f240f57cc48e1f1f09c1ee870b3f0690f72f23ffacc5180c6904540eb677b0ec69993b1ae3c0d397
-
SSDEEP
768:tdhO/poiiUcjlJIn8zH9Xqk5nWEZ5SbTDa/WI7CPW5V:jw+jjgn+H9XqcnW85SbTGWId
Malware Config
Extracted
xenorat
192.168.1.68
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
SysUpd
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2928 SysUpd.exe -
Loads dropped DLL 1 IoCs
pid Process 1504 SysUpd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2948 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2928 1504 SysUpd.exe 28 PID 1504 wrote to memory of 2928 1504 SysUpd.exe 28 PID 1504 wrote to memory of 2928 1504 SysUpd.exe 28 PID 1504 wrote to memory of 2928 1504 SysUpd.exe 28 PID 2928 wrote to memory of 2948 2928 SysUpd.exe 29 PID 2928 wrote to memory of 2948 2928 SysUpd.exe 29 PID 2928 wrote to memory of 2948 2928 SysUpd.exe 29 PID 2928 wrote to memory of 2948 2928 SysUpd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SysUpd.exe"C:\Users\Admin\AppData\Local\Temp\SysUpd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\XenoManager\SysUpd.exe"C:\Users\Admin\AppData\Roaming\XenoManager\SysUpd.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "SysUpd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp81CD.tmp" /F3⤵
- Creates scheduled task(s)
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5561c077a6f6e44fe5e3732633448ee0f
SHA1d0c8a6f3ca14bb07e5480213bd05b6cded9fdd37
SHA256ed1feae16131c24c3c9ecad996928a6abb86e5b6095905c7da1531ff2a47ce88
SHA5125a00840f33b24355dad3049adf99ce04c6da53eff0f08802c0ca49d0ef6cb9b91b10c0b767be1ad9163409800272369655cc94b59d7d7cda7fe25fb6bc367cea
-
Filesize
45KB
MD50c0a54e961d1aead20b9c4a75b3723d4
SHA19a87e7e509175d096477c8d3f2e3bed94f8d646a
SHA2563ac1adc75ac38013eb7f2aa103c624b7ef5a628333b929841c043890aee42b79
SHA512c9ffbbcc79198dbb3439976ec1e19c7a01bebd9e74af0a87f240f57cc48e1f1f09c1ee870b3f0690f72f23ffacc5180c6904540eb677b0ec69993b1ae3c0d397