Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 07:16
Behavioral task
behavioral1
Sample
virus.exe
Resource
win7-20240221-en
General
-
Target
virus.exe
-
Size
45KB
-
MD5
e4b7b0e78f6ab19917d854a6cace58e6
-
SHA1
484bfb18867f5a8e2cd57e01b4fd7340fd4363de
-
SHA256
c5c11645c327b64591cd3041b3fd100150c5820ac03eb6eeb8717b14cd9516f1
-
SHA512
8e71d9f60443774898d2782afd8128afacbf83e2b14e15ecfddd84499780132c20d03ea3ce4672e680b1065d4f4d392729d5bcef900fed9ed6845543b44b8957
-
SSDEEP
768:KdhO/poiiUcjlJInzEH9Xqk5nWEZ5SbTDaFWI7CPW5B:sw+jjgnYH9XqcnW85SbTcWIZ
Malware Config
Extracted
xenorat
a rat
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
updater
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation virus.exe -
Executes dropped EXE 1 IoCs
pid Process 1652 virus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3288 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1652 1088 virus.exe 85 PID 1088 wrote to memory of 1652 1088 virus.exe 85 PID 1088 wrote to memory of 1652 1088 virus.exe 85 PID 1652 wrote to memory of 3288 1652 virus.exe 98 PID 1652 wrote to memory of 3288 1652 virus.exe 98 PID 1652 wrote to memory of 3288 1652 virus.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\virus.exe"C:\Users\Admin\AppData\Local\Temp\virus.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\virus.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\virus.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp441D.tmp" /F3⤵
- Creates scheduled task(s)
PID:3288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD5e4b7b0e78f6ab19917d854a6cace58e6
SHA1484bfb18867f5a8e2cd57e01b4fd7340fd4363de
SHA256c5c11645c327b64591cd3041b3fd100150c5820ac03eb6eeb8717b14cd9516f1
SHA5128e71d9f60443774898d2782afd8128afacbf83e2b14e15ecfddd84499780132c20d03ea3ce4672e680b1065d4f4d392729d5bcef900fed9ed6845543b44b8957
-
Filesize
1KB
MD50ff12ba84c82e6144003bc5f1f86e6ee
SHA1fa57a724c63d0d2390aa8bc9c1ffb61afe0eabd8
SHA256d1e07e5634a265d9b1cbab1249c0c2233281d18a9a3ed85f11603a41e9da61a8
SHA5125695daeff65a84499ade8089875b7ed3b623fb4ea3b630b650cf2a28bf18fb3ba26e4bb16b0060126a1a6a306143ab8684e184e1d775f9773879ba6496817ca8