Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 06:10
Static task
static1
Behavioral task
behavioral1
Sample
Comprobante.exe
Resource
win7-20240419-en
General
-
Target
Comprobante.exe
-
Size
242KB
-
MD5
88569a0094dafd1c5d804534cc6afde4
-
SHA1
ccf747db107b4e3a6aae1fb202b2aed36eba8bf4
-
SHA256
9c5864e5d700ac53ebd61bd2494d93f9b43e5f74275a7204ff6d04adabcc397d
-
SHA512
73901b82c35d86cd547dcd7f378d914dcbdfe67b5d8691527e77dfcf9c42fc0b384e6ec527555a98de7e397904923b95ae0d5a48737f6570e6d77bf82baf4352
-
SSDEEP
6144:yEbA05j2yCleJJ2qnqnCQlTDSxL1wy1r41XaulCQGZMlIvBIEPYr+A29F4I:yEbA05jKmJ2qwkL1N1CnlnlIvBIEPYrU
Malware Config
Extracted
xenorat
dns.requimacofradian.site
Xeno_rat_nd8818g
-
delay
60000
-
install_path
appdata
-
port
1243
-
startup_name
uic
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Comprobante.exe -
Executes dropped EXE 4 IoCs
pid Process 3208 Comprobante.exe 5112 Comprobante.exe 4616 Comprobante.exe 1016 Comprobante.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3432 set thread context of 3680 3432 Comprobante.exe 84 PID 3432 set thread context of 4948 3432 Comprobante.exe 85 PID 3432 set thread context of 2092 3432 Comprobante.exe 86 PID 3208 set thread context of 5112 3208 Comprobante.exe 94 PID 3208 set thread context of 4616 3208 Comprobante.exe 95 PID 3208 set thread context of 1016 3208 Comprobante.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3100 4948 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 336 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3432 Comprobante.exe Token: SeDebugPrivilege 3208 Comprobante.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3432 wrote to memory of 3680 3432 Comprobante.exe 84 PID 3432 wrote to memory of 3680 3432 Comprobante.exe 84 PID 3432 wrote to memory of 3680 3432 Comprobante.exe 84 PID 3432 wrote to memory of 3680 3432 Comprobante.exe 84 PID 3432 wrote to memory of 3680 3432 Comprobante.exe 84 PID 3432 wrote to memory of 3680 3432 Comprobante.exe 84 PID 3432 wrote to memory of 3680 3432 Comprobante.exe 84 PID 3432 wrote to memory of 3680 3432 Comprobante.exe 84 PID 3432 wrote to memory of 4948 3432 Comprobante.exe 85 PID 3432 wrote to memory of 4948 3432 Comprobante.exe 85 PID 3432 wrote to memory of 4948 3432 Comprobante.exe 85 PID 3432 wrote to memory of 4948 3432 Comprobante.exe 85 PID 3432 wrote to memory of 4948 3432 Comprobante.exe 85 PID 3432 wrote to memory of 4948 3432 Comprobante.exe 85 PID 3432 wrote to memory of 4948 3432 Comprobante.exe 85 PID 3432 wrote to memory of 4948 3432 Comprobante.exe 85 PID 3432 wrote to memory of 2092 3432 Comprobante.exe 86 PID 3432 wrote to memory of 2092 3432 Comprobante.exe 86 PID 3432 wrote to memory of 2092 3432 Comprobante.exe 86 PID 3432 wrote to memory of 2092 3432 Comprobante.exe 86 PID 3432 wrote to memory of 2092 3432 Comprobante.exe 86 PID 3432 wrote to memory of 2092 3432 Comprobante.exe 86 PID 3432 wrote to memory of 2092 3432 Comprobante.exe 86 PID 3432 wrote to memory of 2092 3432 Comprobante.exe 86 PID 3680 wrote to memory of 3208 3680 Comprobante.exe 89 PID 3680 wrote to memory of 3208 3680 Comprobante.exe 89 PID 3680 wrote to memory of 3208 3680 Comprobante.exe 89 PID 3208 wrote to memory of 5112 3208 Comprobante.exe 94 PID 3208 wrote to memory of 5112 3208 Comprobante.exe 94 PID 3208 wrote to memory of 5112 3208 Comprobante.exe 94 PID 3208 wrote to memory of 5112 3208 Comprobante.exe 94 PID 3208 wrote to memory of 5112 3208 Comprobante.exe 94 PID 3208 wrote to memory of 5112 3208 Comprobante.exe 94 PID 3208 wrote to memory of 5112 3208 Comprobante.exe 94 PID 3208 wrote to memory of 5112 3208 Comprobante.exe 94 PID 3208 wrote to memory of 4616 3208 Comprobante.exe 95 PID 3208 wrote to memory of 4616 3208 Comprobante.exe 95 PID 3208 wrote to memory of 4616 3208 Comprobante.exe 95 PID 3208 wrote to memory of 4616 3208 Comprobante.exe 95 PID 3208 wrote to memory of 4616 3208 Comprobante.exe 95 PID 3208 wrote to memory of 4616 3208 Comprobante.exe 95 PID 3208 wrote to memory of 4616 3208 Comprobante.exe 95 PID 3208 wrote to memory of 4616 3208 Comprobante.exe 95 PID 3208 wrote to memory of 1016 3208 Comprobante.exe 96 PID 3208 wrote to memory of 1016 3208 Comprobante.exe 96 PID 3208 wrote to memory of 1016 3208 Comprobante.exe 96 PID 3208 wrote to memory of 1016 3208 Comprobante.exe 96 PID 3208 wrote to memory of 1016 3208 Comprobante.exe 96 PID 3208 wrote to memory of 1016 3208 Comprobante.exe 96 PID 3208 wrote to memory of 1016 3208 Comprobante.exe 96 PID 3208 wrote to memory of 1016 3208 Comprobante.exe 96 PID 2092 wrote to memory of 336 2092 Comprobante.exe 106 PID 2092 wrote to memory of 336 2092 Comprobante.exe 106 PID 2092 wrote to memory of 336 2092 Comprobante.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\Comprobante.exe"C:\Users\Admin\AppData\Local\Temp\Comprobante.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\Comprobante.exeC:\Users\Admin\AppData\Local\Temp\Comprobante.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exeC:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe4⤵
- Executes dropped EXE
PID:5112
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exeC:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe4⤵
- Executes dropped EXE
PID:4616
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exeC:\Users\Admin\AppData\Roaming\XenoManager\Comprobante.exe4⤵
- Executes dropped EXE
PID:1016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Comprobante.exeC:\Users\Admin\AppData\Local\Temp\Comprobante.exe2⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 803⤵
- Program crash
PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Comprobante.exeC:\Users\Admin\AppData\Local\Temp\Comprobante.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "uic" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2064.tmp" /F3⤵
- Creates scheduled task(s)
PID:336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4948 -ip 49481⤵PID:1396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
1KB
MD58bebc590162576dee61b15d4b1a8e92f
SHA19c6e52f7a46d097a842837a8ea6ba21027f42535
SHA2564c5a48fd2b642faeef01fad4ff1ef01e8e4c63c6d87997a04e46489b3dbb466c
SHA51264a143fe89a53bc349f6624c169231a7673bd7798abf74b30fdc89ebd0f4b95859173e06b18a402ad72eea5ca2f6408c396f0be4a60b0dfc15f32cbd4fe6ec6a
-
Filesize
242KB
MD588569a0094dafd1c5d804534cc6afde4
SHA1ccf747db107b4e3a6aae1fb202b2aed36eba8bf4
SHA2569c5864e5d700ac53ebd61bd2494d93f9b43e5f74275a7204ff6d04adabcc397d
SHA51273901b82c35d86cd547dcd7f378d914dcbdfe67b5d8691527e77dfcf9c42fc0b384e6ec527555a98de7e397904923b95ae0d5a48737f6570e6d77bf82baf4352