Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 06:13
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231129-en
General
-
Target
tmp.exe
-
Size
50KB
-
MD5
90e548580d8ca36734fc3819c112fa47
-
SHA1
e97a90b53c364d2d404c8341a6726f598873eca2
-
SHA256
33315fc72bfed46fa5e4e6181ff12b009f96bed17bc905804b33fd10eff6bc6a
-
SHA512
bf4fed772da8a0087f16b91b38388409e68495c1d9bb1b31dd3df120ae36ba9ab59e5cc5e5d2e57277059651c19df1d906afbc0451491d5262993567c357c627
-
SSDEEP
768:1dhO/poiiUcjlJInKwH9Xqk5nWEZ5SbTDa0pWI7CPW5Sn:Lw+jjgnTH9XqcnW85SbTTpWII
Malware Config
Extracted
xenorat
94.156.67.9
222ef5be-4d8a-4b59-8c56-f49f63726537
-
delay
5000
-
install_path
appdata
-
port
4456
-
startup_name
svhcost
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 4068 tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3524 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3624 wrote to memory of 4068 3624 tmp.exe 87 PID 3624 wrote to memory of 4068 3624 tmp.exe 87 PID 3624 wrote to memory of 4068 3624 tmp.exe 87 PID 4068 wrote to memory of 3524 4068 tmp.exe 95 PID 4068 wrote to memory of 3524 4068 tmp.exe 95 PID 4068 wrote to memory of 3524 4068 tmp.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Roaming\XenoManager\tmp.exe"C:\Users\Admin\AppData\Roaming\XenoManager\tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svhcost" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6EE6.tmp" /F3⤵
- Creates scheduled task(s)
PID:3524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5b1f42884fb63efe19bd409d99c07ac07
SHA15c191c636098e88fc5b0c3cf0fb0d637b72395e2
SHA2568731ad01dea8d9a1adb5b327aa836313a92286622f4645bc8309a448fc5249f7
SHA512450c008341d73e397dee8267744b1d49c25a8e937a08a5e57267bf5d48547f2cdbccac57944bf1ca6011636e516d5837a1df4d3e1b671aac1dc20300a3708c4c
-
Filesize
50KB
MD590e548580d8ca36734fc3819c112fa47
SHA1e97a90b53c364d2d404c8341a6726f598873eca2
SHA25633315fc72bfed46fa5e4e6181ff12b009f96bed17bc905804b33fd10eff6bc6a
SHA512bf4fed772da8a0087f16b91b38388409e68495c1d9bb1b31dd3df120ae36ba9ab59e5cc5e5d2e57277059651c19df1d906afbc0451491d5262993567c357c627