Analysis
-
max time kernel
128s -
max time network
131s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-05-2024 16:02
Behavioral task
behavioral1
Sample
stzb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
stzb.exe
Resource
win10v2004-20240508-en
General
-
Target
stzb.exe
-
Size
45KB
-
MD5
d699990c3a4490c11c156fec8add57d7
-
SHA1
27227c08812566529e4a36d00655a25343fed2c0
-
SHA256
3a27cbf28bf377fdaf2ede53ce2c4df68bc2a69de9a97912fc2bb836e643a95f
-
SHA512
7fdb8064bd9ff20318da59967b1b8068eac047729baabdf19ce99145fd647a546eb57a9e02d22166afc4d839476932dbb8b54305e0026140a1de6ef834620b65
-
SSDEEP
768:EdhO/poiiUcjlJInNHqH9Xqk5nWEZ5SbTDasWI7CPW5Q:ew+jjgnEH9XqcnW85SbTFWI4
Malware Config
Extracted
xenorat
ayumi-42243.portmap.host
Xeno_rat_nd8912d
-
delay
1000
-
install_path
appdata
-
port
42243
-
startup_name
asdf
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3548 stzb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 564 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2320 wrote to memory of 3548 2320 stzb.exe 79 PID 2320 wrote to memory of 3548 2320 stzb.exe 79 PID 2320 wrote to memory of 3548 2320 stzb.exe 79 PID 3548 wrote to memory of 564 3548 stzb.exe 81 PID 3548 wrote to memory of 564 3548 stzb.exe 81 PID 3548 wrote to memory of 564 3548 stzb.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\stzb.exe"C:\Users\Admin\AppData\Local\Temp\stzb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Roaming\XenoManager\stzb.exe"C:\Users\Admin\AppData\Roaming\XenoManager\stzb.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "asdf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4BFD.tmp" /F3⤵
- Creates scheduled task(s)
PID:564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
1KB
MD5cd09efc4be2e9bcf7f87fe2202d1c2e7
SHA1c3770bd132cc03c398018039f957c3299be702c2
SHA2561986597741adca1243849a0622133bf3bb87460b7c10d714ceb0ee3c11a15931
SHA512c8b27a0e2d8a211577fd1fb739346af733e24cccd1fe59b76e8ea47c737a7c3a0820a763806234d74ffda57f2a4fc3158ea5f9e097779c6bfa4e93455d6804ab
-
Filesize
45KB
MD5d699990c3a4490c11c156fec8add57d7
SHA127227c08812566529e4a36d00655a25343fed2c0
SHA2563a27cbf28bf377fdaf2ede53ce2c4df68bc2a69de9a97912fc2bb836e643a95f
SHA5127fdb8064bd9ff20318da59967b1b8068eac047729baabdf19ce99145fd647a546eb57a9e02d22166afc4d839476932dbb8b54305e0026140a1de6ef834620b65