Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 16:10
Behavioral task
behavioral1
Sample
stub.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
stub.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
stub.exe
Resource
win10v2004-20240508-en
General
-
Target
stub.exe
-
Size
45KB
-
MD5
7b6df057cf7e923a43da88e8058b740f
-
SHA1
9a106e83e0e9a5f2df9f7fffd626a12230700e49
-
SHA256
9f1f2c2d9f93d52c9b8bb0df11dd186327a9f428a8bf74943a9923ac6c62fb1f
-
SHA512
b2a213a39143b8cfed5bc4db93dd16b4537d56110e093459f6f1e2521aa110399e16456e6fe835e8f4c690d2d39d9b020f022cb0fabf7be58daae81a10718480
-
SSDEEP
768:vdhO/poiiUcjlJInQTwH9Xqk5nWEZ5SbTDaSWI7CPW5p:lw+jjgnBH9XqcnW85SbTLWIR
Malware Config
Extracted
xenorat
ayumi-38161.portmap.host
Xeno_rat_nd8912d
-
delay
1000
-
install_path
temp
-
port
38161
-
startup_name
nothingset
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1048 stub.exe -
Loads dropped DLL 1 IoCs
pid Process 1632 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1048 1632 stub.exe 28 PID 1632 wrote to memory of 1048 1632 stub.exe 28 PID 1632 wrote to memory of 1048 1632 stub.exe 28 PID 1632 wrote to memory of 1048 1632 stub.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\stub.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\stub.exe"2⤵
- Executes dropped EXE
PID:1048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD57b6df057cf7e923a43da88e8058b740f
SHA19a106e83e0e9a5f2df9f7fffd626a12230700e49
SHA2569f1f2c2d9f93d52c9b8bb0df11dd186327a9f428a8bf74943a9923ac6c62fb1f
SHA512b2a213a39143b8cfed5bc4db93dd16b4537d56110e093459f6f1e2521aa110399e16456e6fe835e8f4c690d2d39d9b020f022cb0fabf7be58daae81a10718480