Analysis
-
max time kernel
600s -
max time network
453s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 20:01
General
-
Target
sdfsdfs.exe
-
Size
51KB
-
MD5
2553697d3450b13cc2d7cd0c65ef609f
-
SHA1
a6954b0309a0e3cd1186c174beff53e5cbd05e64
-
SHA256
2967987bc0068a46ec1a2809804780d0ae9e746faf58c2319ca315cf36306c13
-
SHA512
204b7d0dfc66926935c1a48939c7cc09f2f6eaf87209bf908516bf5faa416f91e9b52d0dcf57c983738c991cd1747475b5f1c6752fa0d3f44cb5a48e46acac73
-
SSDEEP
768:tivdjHrddilbVauou79Eo32q4XBR2HjBSkGu2yPo+LGZYebFDaxk6RNSgNOU:+pHmVauo3DjRUDj6CSYebFUlf4U
Malware Config
Extracted
xenorat
centre-clan.gl.at.ply.gg
nignig_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
40354
-
startup_name
discord
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation sdfsdfs.exe -
Executes dropped EXE 1 IoCs
pid Process 4812 sdfsdfs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 184 wrote to memory of 4812 184 sdfsdfs.exe 84 PID 184 wrote to memory of 4812 184 sdfsdfs.exe 84 PID 184 wrote to memory of 4812 184 sdfsdfs.exe 84 PID 4812 wrote to memory of 5036 4812 sdfsdfs.exe 94 PID 4812 wrote to memory of 5036 4812 sdfsdfs.exe 94 PID 4812 wrote to memory of 5036 4812 sdfsdfs.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\sdfsdfs.exe"C:\Users\Admin\AppData\Local\Temp\sdfsdfs.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\sdfsdfs.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\sdfsdfs.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "discord" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5728.tmp" /F3⤵
- Creates scheduled task(s)
PID:5036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
51KB
MD52553697d3450b13cc2d7cd0c65ef609f
SHA1a6954b0309a0e3cd1186c174beff53e5cbd05e64
SHA2562967987bc0068a46ec1a2809804780d0ae9e746faf58c2319ca315cf36306c13
SHA512204b7d0dfc66926935c1a48939c7cc09f2f6eaf87209bf908516bf5faa416f91e9b52d0dcf57c983738c991cd1747475b5f1c6752fa0d3f44cb5a48e46acac73
-
Filesize
1KB
MD509cbabb537202ce94c78c5ad9ca7a170
SHA162807e4254abf0a8c8faa49e9d0cc6c9fed6c4fc
SHA256bcb9c3de04c0bae50b72ce4e315478bc60d70e519db6727d5ac72ce3e0843664
SHA512f40d8aa48da1f5ce3f6016394006b186902e4f07d20969fea7f3d9ae7a812afcee628110c18dbc2d19f27a54a8c6a29f514ec5055e56bad3c80aca64c72574e2