Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 16:02
Behavioral task
behavioral1
Sample
stzb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
stzb.exe
Resource
win10v2004-20240508-en
General
-
Target
stzb.exe
-
Size
45KB
-
MD5
d699990c3a4490c11c156fec8add57d7
-
SHA1
27227c08812566529e4a36d00655a25343fed2c0
-
SHA256
3a27cbf28bf377fdaf2ede53ce2c4df68bc2a69de9a97912fc2bb836e643a95f
-
SHA512
7fdb8064bd9ff20318da59967b1b8068eac047729baabdf19ce99145fd647a546eb57a9e02d22166afc4d839476932dbb8b54305e0026140a1de6ef834620b65
-
SSDEEP
768:EdhO/poiiUcjlJInNHqH9Xqk5nWEZ5SbTDasWI7CPW5Q:ew+jjgnEH9XqcnW85SbTFWI4
Malware Config
Extracted
xenorat
ayumi-42243.portmap.host
Xeno_rat_nd8912d
-
delay
1000
-
install_path
appdata
-
port
42243
-
startup_name
asdf
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation stzb.exe -
Executes dropped EXE 1 IoCs
pid Process 1076 stzb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1680 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4356 wrote to memory of 1076 4356 stzb.exe 84 PID 4356 wrote to memory of 1076 4356 stzb.exe 84 PID 4356 wrote to memory of 1076 4356 stzb.exe 84 PID 1076 wrote to memory of 1680 1076 stzb.exe 86 PID 1076 wrote to memory of 1680 1076 stzb.exe 86 PID 1076 wrote to memory of 1680 1076 stzb.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\stzb.exe"C:\Users\Admin\AppData\Local\Temp\stzb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Roaming\XenoManager\stzb.exe"C:\Users\Admin\AppData\Roaming\XenoManager\stzb.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "asdf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F78.tmp" /F3⤵
- Creates scheduled task(s)
PID:1680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5cd09efc4be2e9bcf7f87fe2202d1c2e7
SHA1c3770bd132cc03c398018039f957c3299be702c2
SHA2561986597741adca1243849a0622133bf3bb87460b7c10d714ceb0ee3c11a15931
SHA512c8b27a0e2d8a211577fd1fb739346af733e24cccd1fe59b76e8ea47c737a7c3a0820a763806234d74ffda57f2a4fc3158ea5f9e097779c6bfa4e93455d6804ab
-
Filesize
45KB
MD5d699990c3a4490c11c156fec8add57d7
SHA127227c08812566529e4a36d00655a25343fed2c0
SHA2563a27cbf28bf377fdaf2ede53ce2c4df68bc2a69de9a97912fc2bb836e643a95f
SHA5127fdb8064bd9ff20318da59967b1b8068eac047729baabdf19ce99145fd647a546eb57a9e02d22166afc4d839476932dbb8b54305e0026140a1de6ef834620b65