Analysis
-
max time kernel
141s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 01:04
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20240221-en
General
-
Target
123.exe
-
Size
51KB
-
MD5
77e3b9502255f892008a3e3eee232d49
-
SHA1
c16f3247485da1a917b95e99400dfb94884a7b5e
-
SHA256
460ae6dfdb2391263df9590eb174220e246d78fdc1e483a92e09d164a454a627
-
SHA512
936253af9294b975a3eba60b6a151892a0020b79c6df4ede4ce46d3d6b19383e59d6fbdbf2e5a00bd5508e8a0a13ce454206da5fe79e5df2108fb555f98b1e11
-
SSDEEP
768:8oivdjHrddilbVauou79EoIkqhnByfOHf2BSkGu2yPo+LGZYebFDa8Y6RNSgNO+:wpHmVauo3g0yf5Dj6CSYebFZxf4+
Malware Config
Extracted
xenorat
127.0.0.1
t7867689retufyufgu
-
delay
5000
-
install_path
appdata
-
port
1234
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 123.exe -
Executes dropped EXE 1 IoCs
pid Process 1000 123.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2040 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1000 1832 123.exe 84 PID 1832 wrote to memory of 1000 1832 123.exe 84 PID 1832 wrote to memory of 1000 1832 123.exe 84 PID 1000 wrote to memory of 2040 1000 123.exe 95 PID 1000 wrote to memory of 2040 1000 123.exe 95 PID 1000 wrote to memory of 2040 1000 123.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\123.exe"C:\Users\Admin\AppData\Local\Temp\123.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Roaming\XenoManager\123.exe"C:\Users\Admin\AppData\Roaming\XenoManager\123.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp58AF.tmp" /F3⤵
- Creates scheduled task(s)
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD516667b3f75269b3ea1cd146502ffcb6f
SHA103ad2dc777b0ae88a8a2de0e63f8fe5e9b6f43eb
SHA2563882aa8d6d6edd6495bf39c4ac8e97c3a81b33d72ef9e925d539feaecdd18201
SHA5126b9f814d687372924a2217459cac96dfae330e4a60d5b8174d24db95763c32750e986f4a98cf25c994942596334c1c2a2bebd18d3c18f83c3877763de36b60f5
-
Filesize
51KB
MD577e3b9502255f892008a3e3eee232d49
SHA1c16f3247485da1a917b95e99400dfb94884a7b5e
SHA256460ae6dfdb2391263df9590eb174220e246d78fdc1e483a92e09d164a454a627
SHA512936253af9294b975a3eba60b6a151892a0020b79c6df4ede4ce46d3d6b19383e59d6fbdbf2e5a00bd5508e8a0a13ce454206da5fe79e5df2108fb555f98b1e11