Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 19:49
Behavioral task
behavioral1
Sample
2869e74463bfe1b97d8459392556c2d5f11d88e06ac25442d7f996cb900691ff.exe
Resource
win7-20240215-en
windows7-x64
1 signatures
150 seconds
General
-
Target
2869e74463bfe1b97d8459392556c2d5f11d88e06ac25442d7f996cb900691ff.exe
-
Size
43KB
-
MD5
a5fdfe18e566e3f29337b0309a4344fc
-
SHA1
bc14472698ece968c161f41cd163e0fd3205e8cc
-
SHA256
2869e74463bfe1b97d8459392556c2d5f11d88e06ac25442d7f996cb900691ff
-
SHA512
a1757853687848cfd5801b255d79b596942561e11e77e9141863bd0679f9b9a3cff397c33348170d11ce5891ff12694bd31aa3ff9f5cdd89bd791716f1c585b5
-
SSDEEP
768:RmgeB6V9JlMxOYSVD+Wj1hsrIwK2B6/PPnFgjsjOKMUbpYmBCytijpe:RBeAJMxvSVJIY2BOP2jsnMUbpPZt2e
Malware Config
Extracted
Family
xenorat
C2
localhost
Mutex
testing 123123
Attributes
-
delay
1000
-
install_path
nothingset
-
port
1234
-
startup_name
nothingset
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2364-0-0x000000007495E000-0x000000007495F000-memory.dmpFilesize
4KB
-
memory/2364-1-0x0000000000BF0000-0x0000000000C02000-memory.dmpFilesize
72KB
-
memory/2364-2-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/2364-3-0x000000007495E000-0x000000007495F000-memory.dmpFilesize
4KB
-
memory/2364-4-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB