Analysis
-
max time kernel
9s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 01:04
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20240221-en
General
-
Target
123.exe
-
Size
51KB
-
MD5
77e3b9502255f892008a3e3eee232d49
-
SHA1
c16f3247485da1a917b95e99400dfb94884a7b5e
-
SHA256
460ae6dfdb2391263df9590eb174220e246d78fdc1e483a92e09d164a454a627
-
SHA512
936253af9294b975a3eba60b6a151892a0020b79c6df4ede4ce46d3d6b19383e59d6fbdbf2e5a00bd5508e8a0a13ce454206da5fe79e5df2108fb555f98b1e11
-
SSDEEP
768:8oivdjHrddilbVauou79EoIkqhnByfOHf2BSkGu2yPo+LGZYebFDa8Y6RNSgNO+:wpHmVauo3g0yf5Dj6CSYebFZxf4+
Malware Config
Extracted
xenorat
127.0.0.1
t7867689retufyufgu
-
delay
5000
-
install_path
appdata
-
port
1234
-
startup_name
nothingset
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3060 123.exe -
Loads dropped DLL 1 IoCs
pid Process 2952 123.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2952 wrote to memory of 3060 2952 123.exe 28 PID 2952 wrote to memory of 3060 2952 123.exe 28 PID 2952 wrote to memory of 3060 2952 123.exe 28 PID 2952 wrote to memory of 3060 2952 123.exe 28 PID 3060 wrote to memory of 2828 3060 123.exe 29 PID 3060 wrote to memory of 2828 3060 123.exe 29 PID 3060 wrote to memory of 2828 3060 123.exe 29 PID 3060 wrote to memory of 2828 3060 123.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\123.exe"C:\Users\Admin\AppData\Local\Temp\123.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Roaming\XenoManager\123.exe"C:\Users\Admin\AppData\Roaming\XenoManager\123.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2368.tmp" /F3⤵
- Creates scheduled task(s)
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD516667b3f75269b3ea1cd146502ffcb6f
SHA103ad2dc777b0ae88a8a2de0e63f8fe5e9b6f43eb
SHA2563882aa8d6d6edd6495bf39c4ac8e97c3a81b33d72ef9e925d539feaecdd18201
SHA5126b9f814d687372924a2217459cac96dfae330e4a60d5b8174d24db95763c32750e986f4a98cf25c994942596334c1c2a2bebd18d3c18f83c3877763de36b60f5
-
Filesize
51KB
MD577e3b9502255f892008a3e3eee232d49
SHA1c16f3247485da1a917b95e99400dfb94884a7b5e
SHA256460ae6dfdb2391263df9590eb174220e246d78fdc1e483a92e09d164a454a627
SHA512936253af9294b975a3eba60b6a151892a0020b79c6df4ede4ce46d3d6b19383e59d6fbdbf2e5a00bd5508e8a0a13ce454206da5fe79e5df2108fb555f98b1e11