Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 16:43
Behavioral task
behavioral1
Sample
asdf.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
asdf.exe
Resource
win10v2004-20240426-en
General
-
Target
asdf.exe
-
Size
45KB
-
MD5
1a799d58a77fcc79a5ea54edb6150a5d
-
SHA1
63c262b52cf8c7f4aee513d50c4db51fea0f2d4a
-
SHA256
1c1987bcf3f8c636b5d92ce84a56b8e69abc8862c6217f655366b4f3f2582c9c
-
SHA512
9c8f58b01bb46ebe23b1bef4f76d7b9167b9c81e30ed93717235769870a712c6944d63e8f8cf5dfda71ca23510bbb56bc1148157a458a2f876d0c220ac2a88d6
-
SSDEEP
768:1dhO/poiiUcjlJInKYH9Xqk5nWEZ5SbTDaRuI7CPW5k:Lw+jjgnfH9XqcnW85SbTkuI8
Malware Config
Extracted
xenorat
ayumi-38161.portmap.host
Xeno_rat_nd8912d
-
delay
2000
-
install_path
appdata
-
port
38161
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation asdf.exe -
Executes dropped EXE 1 IoCs
pid Process 2916 asdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2916 2912 asdf.exe 84 PID 2912 wrote to memory of 2916 2912 asdf.exe 84 PID 2912 wrote to memory of 2916 2912 asdf.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\asdf.exe"C:\Users\Admin\AppData\Local\Temp\asdf.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Roaming\XenoManager\asdf.exe"C:\Users\Admin\AppData\Roaming\XenoManager\asdf.exe"2⤵
- Executes dropped EXE
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD51a799d58a77fcc79a5ea54edb6150a5d
SHA163c262b52cf8c7f4aee513d50c4db51fea0f2d4a
SHA2561c1987bcf3f8c636b5d92ce84a56b8e69abc8862c6217f655366b4f3f2582c9c
SHA5129c8f58b01bb46ebe23b1bef4f76d7b9167b9c81e30ed93717235769870a712c6944d63e8f8cf5dfda71ca23510bbb56bc1148157a458a2f876d0c220ac2a88d6