Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 06:10
Static task
static1
Behavioral task
behavioral1
Sample
Comprobante.exe
Resource
win7-20231129-en
General
-
Target
Comprobante.exe
-
Size
242KB
-
MD5
88569a0094dafd1c5d804534cc6afde4
-
SHA1
ccf747db107b4e3a6aae1fb202b2aed36eba8bf4
-
SHA256
9c5864e5d700ac53ebd61bd2494d93f9b43e5f74275a7204ff6d04adabcc397d
-
SHA512
73901b82c35d86cd547dcd7f378d914dcbdfe67b5d8691527e77dfcf9c42fc0b384e6ec527555a98de7e397904923b95ae0d5a48737f6570e6d77bf82baf4352
-
SSDEEP
6144:yEbA05j2yCleJJ2qnqnCQlTDSxL1wy1r41XaulCQGZMlIvBIEPYr+A29F4I:yEbA05jKmJ2qwkL1N1CnlnlIvBIEPYrU
Malware Config
Extracted
xenorat
dns.requimacofradian.site
Xeno_rat_nd8818g
-
delay
60000
-
install_path
appdata
-
port
1243
-
startup_name
uic
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation Comprobante.exe -
Executes dropped EXE 4 IoCs
pid Process 2720 Comprobante.exe 3300 Comprobante.exe 4040 Comprobante.exe 3568 Comprobante.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3192 set thread context of 404 3192 Comprobante.exe 87 PID 3192 set thread context of 5012 3192 Comprobante.exe 88 PID 3192 set thread context of 1976 3192 Comprobante.exe 89 PID 2720 set thread context of 3300 2720 Comprobante.exe 96 PID 2720 set thread context of 4040 2720 Comprobante.exe 97 PID 2720 set thread context of 3568 2720 Comprobante.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5068 5012 WerFault.exe 88 4456 1976 WerFault.exe 89 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3604 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3192 Comprobante.exe Token: SeDebugPrivilege 2720 Comprobante.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3192 wrote to memory of 404 3192 Comprobante.exe 87 PID 3192 wrote to memory of 404 3192 Comprobante.exe 87 PID 3192 wrote to memory of 404 3192 Comprobante.exe 87 PID 3192 wrote to memory of 404 3192 Comprobante.exe 87 PID 3192 wrote to memory of 404 3192 Comprobante.exe 87 PID 3192 wrote to memory of 404 3192 Comprobante.exe 87 PID 3192 wrote to memory of 404 3192 Comprobante.exe 87 PID 3192 wrote to memory of 404 3192 Comprobante.exe 87 PID 3192 wrote to memory of 5012 3192 Comprobante.exe 88 PID 3192 wrote to memory of 5012 3192 Comprobante.exe 88 PID 3192 wrote to memory of 5012 3192 Comprobante.exe 88 PID 3192 wrote to memory of 5012 3192 Comprobante.exe 88 PID 3192 wrote to memory of 5012 3192 Comprobante.exe 88 PID 3192 wrote to memory of 5012 3192 Comprobante.exe 88 PID 3192 wrote to memory of 5012 3192 Comprobante.exe 88 PID 3192 wrote to memory of 5012 3192 Comprobante.exe 88 PID 3192 wrote to memory of 1976 3192 Comprobante.exe 89 PID 3192 wrote to memory of 1976 3192 Comprobante.exe 89 PID 3192 wrote to memory of 1976 3192 Comprobante.exe 89 PID 3192 wrote to memory of 1976 3192 Comprobante.exe 89 PID 3192 wrote to memory of 1976 3192 Comprobante.exe 89 PID 3192 wrote to memory of 1976 3192 Comprobante.exe 89 PID 3192 wrote to memory of 1976 3192 Comprobante.exe 89 PID 3192 wrote to memory of 1976 3192 Comprobante.exe 89 PID 404 wrote to memory of 2720 404 Comprobante.exe 93 PID 404 wrote to memory of 2720 404 Comprobante.exe 93 PID 404 wrote to memory of 2720 404 Comprobante.exe 93 PID 2720 wrote to memory of 3300 2720 Comprobante.exe 96 PID 2720 wrote to memory of 3300 2720 Comprobante.exe 96 PID 2720 wrote to memory of 3300 2720 Comprobante.exe 96 PID 2720 wrote to memory of 3300 2720 Comprobante.exe 96 PID 2720 wrote to memory of 3300 2720 Comprobante.exe 96 PID 2720 wrote to memory of 3300 2720 Comprobante.exe 96 PID 2720 wrote to memory of 3300 2720 Comprobante.exe 96 PID 2720 wrote to memory of 3300 2720 Comprobante.exe 96 PID 2720 wrote to memory of 4040 2720 Comprobante.exe 97 PID 2720 wrote to memory of 4040 2720 Comprobante.exe 97 PID 2720 wrote to memory of 4040 2720 Comprobante.exe 97 PID 2720 wrote to memory of 4040 2720 Comprobante.exe 97 PID 2720 wrote to memory of 4040 2720 Comprobante.exe 97 PID 2720 wrote to memory of 4040 2720 Comprobante.exe 97 PID 2720 wrote to memory of 4040 2720 Comprobante.exe 97 PID 2720 wrote to memory of 4040 2720 Comprobante.exe 97 PID 2720 wrote to memory of 3568 2720 Comprobante.exe 98 PID 2720 wrote to memory of 3568 2720 Comprobante.exe 98 PID 2720 wrote to memory of 3568 2720 Comprobante.exe 98 PID 2720 wrote to memory of 3568 2720 Comprobante.exe 98 PID 2720 wrote to memory of 3568 2720 Comprobante.exe 98 PID 2720 wrote to memory of 3568 2720 Comprobante.exe 98 PID 2720 wrote to memory of 3568 2720 Comprobante.exe 98 PID 2720 wrote to memory of 3568 2720 Comprobante.exe 98 PID 3300 wrote to memory of 3604 3300 Comprobante.exe 108 PID 3300 wrote to memory of 3604 3300 Comprobante.exe 108 PID 3300 wrote to memory of 3604 3300 Comprobante.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Comprobante.exe"C:\Users\Admin\AppData\Local\Temp\Comprobante.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Comprobante.exeC:\Users\Admin\AppData\Local\Temp\Comprobante.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exeC:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "uic" /XML "C:\Users\Admin\AppData\Local\Temp\tmp310E.tmp" /F5⤵
- Creates scheduled task(s)
PID:3604
-
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exeC:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe4⤵
- Executes dropped EXE
PID:4040
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exeC:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe4⤵
- Executes dropped EXE
PID:3568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Comprobante.exeC:\Users\Admin\AppData\Local\Temp\Comprobante.exe2⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 123⤵
- Program crash
PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Comprobante.exeC:\Users\Admin\AppData\Local\Temp\Comprobante.exe2⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 803⤵
- Program crash
PID:4456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1976 -ip 19761⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5012 -ip 50121⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
1KB
MD509070de9c96429af66291da7ae1689aa
SHA1460c28efacf954264a855218d2eaa975e59f0d0a
SHA256d5d7726485d0e67d782876630aa66d2d75bddb49d58b7f0c6ca5cb42bd164c5f
SHA512ef8c45238e05defc381e69cf92ebe56125cb685f464a4dd07f576bf961028de26e72a372300a9cf57ce505f10a9a2a61a36d1d69ae5e65bc5481d896ab136993
-
Filesize
242KB
MD588569a0094dafd1c5d804534cc6afde4
SHA1ccf747db107b4e3a6aae1fb202b2aed36eba8bf4
SHA2569c5864e5d700ac53ebd61bd2494d93f9b43e5f74275a7204ff6d04adabcc397d
SHA51273901b82c35d86cd547dcd7f378d914dcbdfe67b5d8691527e77dfcf9c42fc0b384e6ec527555a98de7e397904923b95ae0d5a48737f6570e6d77bf82baf4352