Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 18:36
Behavioral task
behavioral1
Sample
neverlosecrack laucher.exe
Resource
win7-20240508-en
General
-
Target
neverlosecrack laucher.exe
-
Size
45KB
-
MD5
4a0a8d2a6a0c3a9b727296563cb71690
-
SHA1
b764251a6d82e236c5f652b8a43e5c86c89b8985
-
SHA256
c6869ec4d346b01fb2a17166558038d66840cbe7a4e4a26a2e9a6d29225e699d
-
SHA512
67b68497b3206376a0d364400bfe065fd13f834aced15645afc4315a9097a3e03784eab746a37e11ea4c61f7174998ddb85461d7544b1df350cc12c0def872cc
-
SSDEEP
768:BdhO/poiiUcjlJInJr6BH9Xqk5nWEZ5SbTDaTuI7CPW5Q:/w+jjgniH9XqcnW85SbT2uI4
Malware Config
Extracted
xenorat
0.tcp.eu.ngrok.io
radnom123_34X41
-
delay
5000
-
install_path
appdata
-
port
14119
-
startup_name
window system
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation neverlosecrack laucher.exe -
Executes dropped EXE 1 IoCs
pid Process 3324 neverlosecrack laucher.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 26 0.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2860 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3324 1560 neverlosecrack laucher.exe 86 PID 1560 wrote to memory of 3324 1560 neverlosecrack laucher.exe 86 PID 1560 wrote to memory of 3324 1560 neverlosecrack laucher.exe 86 PID 3324 wrote to memory of 2860 3324 neverlosecrack laucher.exe 96 PID 3324 wrote to memory of 2860 3324 neverlosecrack laucher.exe 96 PID 3324 wrote to memory of 2860 3324 neverlosecrack laucher.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\neverlosecrack laucher.exe"C:\Users\Admin\AppData\Local\Temp\neverlosecrack laucher.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Roaming\XenoManager\neverlosecrack laucher.exe"C:\Users\Admin\AppData\Roaming\XenoManager\neverlosecrack laucher.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "window system" /XML "C:\Users\Admin\AppData\Local\Temp\tmp828E.tmp" /F3⤵
- Creates scheduled task(s)
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5b6493093b4e385f2a9e780d79411f6f7
SHA1508a0b81481e34fd23ee8e1f89ec0cf4aae56952
SHA256716416e566645db22a6d4427a2d7d6f735fe298d464e37697589e062564b97c0
SHA512e53992f924305655ee9ccf2283fb5981348c4093fd7fac21bfc877bf7f005cda8875ad9fc7e903e28d971df96a6ec09a540d2f502b6312dbe601d70b7ff0e097
-
Filesize
45KB
MD54a0a8d2a6a0c3a9b727296563cb71690
SHA1b764251a6d82e236c5f652b8a43e5c86c89b8985
SHA256c6869ec4d346b01fb2a17166558038d66840cbe7a4e4a26a2e9a6d29225e699d
SHA51267b68497b3206376a0d364400bfe065fd13f834aced15645afc4315a9097a3e03784eab746a37e11ea4c61f7174998ddb85461d7544b1df350cc12c0def872cc