Analysis
-
max time kernel
109s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 07:13
Behavioral task
behavioral1
Sample
virus not.exe
Resource
win7-20240221-en
General
-
Target
virus not.exe
-
Size
45KB
-
MD5
e4b7b0e78f6ab19917d854a6cace58e6
-
SHA1
484bfb18867f5a8e2cd57e01b4fd7340fd4363de
-
SHA256
c5c11645c327b64591cd3041b3fd100150c5820ac03eb6eeb8717b14cd9516f1
-
SHA512
8e71d9f60443774898d2782afd8128afacbf83e2b14e15ecfddd84499780132c20d03ea3ce4672e680b1065d4f4d392729d5bcef900fed9ed6845543b44b8957
-
SSDEEP
768:KdhO/poiiUcjlJInzEH9Xqk5nWEZ5SbTDaFWI7CPW5B:sw+jjgnYH9XqcnW85SbTcWIZ
Malware Config
Extracted
xenorat
a rat
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
updater
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2800 virus not.exe -
Loads dropped DLL 1 IoCs
pid Process 1740 virus not.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2548 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2800 1740 virus not.exe 28 PID 1740 wrote to memory of 2800 1740 virus not.exe 28 PID 1740 wrote to memory of 2800 1740 virus not.exe 28 PID 1740 wrote to memory of 2800 1740 virus not.exe 28 PID 2800 wrote to memory of 2548 2800 virus not.exe 29 PID 2800 wrote to memory of 2548 2800 virus not.exe 29 PID 2800 wrote to memory of 2548 2800 virus not.exe 29 PID 2800 wrote to memory of 2548 2800 virus not.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\virus not.exe"C:\Users\Admin\AppData\Local\Temp\virus not.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\virus not.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\virus not.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAD9D.tmp" /F3⤵
- Creates scheduled task(s)
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5e4b7b0e78f6ab19917d854a6cace58e6
SHA1484bfb18867f5a8e2cd57e01b4fd7340fd4363de
SHA256c5c11645c327b64591cd3041b3fd100150c5820ac03eb6eeb8717b14cd9516f1
SHA5128e71d9f60443774898d2782afd8128afacbf83e2b14e15ecfddd84499780132c20d03ea3ce4672e680b1065d4f4d392729d5bcef900fed9ed6845543b44b8957
-
Filesize
1KB
MD51b022c97b94bb0d40725e6afb26ea1e1
SHA138e06bdc7aec3bbdaf92a7c395259caf4de0ebfd
SHA256167c859fd9f3ce539816692494e02b3a942af87077d86c1cd762e24bfeea0f6e
SHA512372068710d8763805913b5e05de564fed281f62a55237f4ac338990f9e7a5dcd4e7080222b37057be9c42eb8aad4bcdbd5a0654129252bf7dc718774f327c8a3