Analysis
-
max time kernel
64s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 23:48
General
-
Target
vaewfsew.exe
-
Size
45KB
-
MD5
6eeb807c40d25bd3f8a7667377920eb6
-
SHA1
69c18c77847f20cee212286e1530256610d42da0
-
SHA256
af403f0a35ed4789e02a55012056ad565d33f464245a2aa411cb06cd2abfd176
-
SHA512
ed82a34890205e6fe37dacb9d647666c65dcb5c979f1a456540799eab87887aca1a62d52335480b0ef85a4dd0183ba3cf3c35863fb2c51466368adc8467ed708
-
SSDEEP
768:gdhO/poiiUcjlJInEonH9Xqk5nWEZ5SbTDafWI7CPW5D:Sw+jjgnPnH9XqcnW85SbTWWI7
Malware Config
Extracted
xenorat
127.0.0.1
VapePatcher
-
delay
5000
-
install_path
appdata
-
port
6666
-
startup_name
Minecraft Launcher
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation vaewfsew.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 vaewfsew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2040 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2988 2400 vaewfsew.exe 83 PID 2400 wrote to memory of 2988 2400 vaewfsew.exe 83 PID 2400 wrote to memory of 2988 2400 vaewfsew.exe 83 PID 2988 wrote to memory of 2040 2988 vaewfsew.exe 88 PID 2988 wrote to memory of 2040 2988 vaewfsew.exe 88 PID 2988 wrote to memory of 2040 2988 vaewfsew.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\vaewfsew.exe"C:\Users\Admin\AppData\Local\Temp\vaewfsew.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\XenoManager\vaewfsew.exe"C:\Users\Admin\AppData\Roaming\XenoManager\vaewfsew.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Minecraft Launcher" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5246.tmp" /F3⤵
- Creates scheduled task(s)
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD59dbf9cb2b2bb1500833ba327ddb4a6cb
SHA167e6e8bbe17965008d3c2347427a8021eb393b74
SHA25605e3360fe6c4d38dd906e6ea532c61de1044c04f967caab5f7dce496102e83f5
SHA5126c153ea0ddaac8264ee3f81c8970e8fc0cb1215cf166d1dd3c8ad291795686f7f30397db69f4753f8e611c23777f46dd8e4a5e7cf3d7ca3920571309d9010cc1
-
Filesize
45KB
MD56eeb807c40d25bd3f8a7667377920eb6
SHA169c18c77847f20cee212286e1530256610d42da0
SHA256af403f0a35ed4789e02a55012056ad565d33f464245a2aa411cb06cd2abfd176
SHA512ed82a34890205e6fe37dacb9d647666c65dcb5c979f1a456540799eab87887aca1a62d52335480b0ef85a4dd0183ba3cf3c35863fb2c51466368adc8467ed708