Analysis
-
max time kernel
12s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-04-2024 16:12
Behavioral task
behavioral1
Sample
ok.exe
Resource
win7-20240221-en
General
-
Target
ok.exe
-
Size
45KB
-
MD5
2d16646ae88e5979ab98de7a372337c8
-
SHA1
dd91c79b53194fa45c78df96d0bd594a35c1508e
-
SHA256
c01236d7be0ab4e31278d02559a12b8a0711144f26d37c6919375022964eba95
-
SHA512
ad61921a8f87ce17c0d4b0a481632ff310e1f150022213094a0844cd06f7942f85685aebc758e4bac368bc2c2f7422618638ab7adbc4e10caf7ed14eba3184ff
-
SSDEEP
768:NdhO/poiiUcjlJInDwH9Xqk5nWEZ5SbTDa0WI7CPW5c:Dw+jjgn0H9XqcnW85SbTlWIk
Malware Config
Extracted
xenorat
fe80::48a6:2b8e:4540:36b9%6
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
SysUpd
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3020 ok.exe -
Loads dropped DLL 1 IoCs
pid Process 1692 ok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2556 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1692 wrote to memory of 3020 1692 ok.exe 28 PID 1692 wrote to memory of 3020 1692 ok.exe 28 PID 1692 wrote to memory of 3020 1692 ok.exe 28 PID 1692 wrote to memory of 3020 1692 ok.exe 28 PID 3020 wrote to memory of 2556 3020 ok.exe 29 PID 3020 wrote to memory of 2556 3020 ok.exe 29 PID 3020 wrote to memory of 2556 3020 ok.exe 29 PID 3020 wrote to memory of 2556 3020 ok.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ok.exe"C:\Users\Admin\AppData\Local\Temp\ok.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\XenoManager\ok.exe"C:\Users\Admin\AppData\Roaming\XenoManager\ok.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "SysUpd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp65C5.tmp" /F3⤵
- Creates scheduled task(s)
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c9aa6bd88516f9bc4b41dcf9dbf3bc5c
SHA13ec3443bdb01171646bfe40ba2f3c4165c5a9b8f
SHA256caaf68a6940e3fbeb4d4381a2cfa1658d604acd56bf075fd0da296db5b8f4bc3
SHA512f5b9ce7896f22b810973e36439b5a091a8a56246bdf9a02d34061b52392230d9eea3b6002fd59663edd045df1d63b35c57a78ea10edacc4732b26fdce45daf8a
-
Filesize
45KB
MD52d16646ae88e5979ab98de7a372337c8
SHA1dd91c79b53194fa45c78df96d0bd594a35c1508e
SHA256c01236d7be0ab4e31278d02559a12b8a0711144f26d37c6919375022964eba95
SHA512ad61921a8f87ce17c0d4b0a481632ff310e1f150022213094a0844cd06f7942f85685aebc758e4bac368bc2c2f7422618638ab7adbc4e10caf7ed14eba3184ff