Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 01:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe
Resource
win7-20240508-en
General
-
Target
2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe
-
Size
5.4MB
-
MD5
5b9731dc85c4c73f4fcc491a17d57fcd
-
SHA1
24699fcc2df32502e959a6f918190eb1b9241319
-
SHA256
a704f907107e0208de4b35e93e6d435dc54fd8f28c87c84250502a2dfa5b5738
-
SHA512
1d0261bc229c2e8ebe3372ef6abcaf9fbe96162d8853c0b9f3c36ab77ebf3d844924d1c5571bd5b4017e227f01ca05985d6b48c4e23d41d59903d0e5ed0502b8
-
SSDEEP
49152:xcIa7C33IJszhP0o/eiY9iCl3miEcUD9HTxTju5EFhoRvE9Zz:qa33IGNPaiCUu0duEFSR
Malware Config
Extracted
xenorat
69.46.15.141
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
nothingset
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4984 powershell.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2532 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 2431936813.exe -
Executes dropped EXE 2 IoCs
pid Process 1208 2431936813.exe 4232 2431936813.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4984 powershell.exe 4984 powershell.exe 3252 powershell.exe 3252 powershell.exe 2788 powershell.exe 2788 powershell.exe 3276 powershell.exe 3276 powershell.exe 4776 powershell.exe 4776 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 3252 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 3276 powershell.exe Token: SeDebugPrivilege 4776 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4984 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 86 PID 4280 wrote to memory of 4984 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 86 PID 4280 wrote to memory of 3252 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 89 PID 4280 wrote to memory of 3252 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 89 PID 4280 wrote to memory of 2788 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 90 PID 4280 wrote to memory of 2788 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 90 PID 4280 wrote to memory of 3276 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 92 PID 4280 wrote to memory of 3276 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 92 PID 4280 wrote to memory of 4776 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 94 PID 4280 wrote to memory of 4776 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 94 PID 4280 wrote to memory of 8 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 95 PID 4280 wrote to memory of 8 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 95 PID 8 wrote to memory of 2532 8 cmd.exe 96 PID 8 wrote to memory of 2532 8 cmd.exe 96 PID 4280 wrote to memory of 1076 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 99 PID 4280 wrote to memory of 1076 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 99 PID 4280 wrote to memory of 1208 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 107 PID 4280 wrote to memory of 1208 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 107 PID 4280 wrote to memory of 1208 4280 2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe 107 PID 1208 wrote to memory of 4232 1208 2431936813.exe 108 PID 1208 wrote to memory of 4232 1208 2431936813.exe 108 PID 1208 wrote to memory of 4232 1208 2431936813.exe 108 PID 4232 wrote to memory of 3724 4232 2431936813.exe 109 PID 4232 wrote to memory of 3724 4232 2431936813.exe 109 PID 4232 wrote to memory of 3724 4232 2431936813.exe 109 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1076 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionExtension C:\Users\Admin\AppData\Local\Temp\*.exe2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -PUAProtection 02⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\system32\cmd.execmd /C netsh advfirewall set allprofiles state off2⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:2532
-
-
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch.exe2⤵
- Views/modifies file attributes
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\2431936813.exeC:\Users\Admin\AppData\Local\Temp\2431936813.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Roaming\XenoManager\2431936813.exe"C:\Users\Admin\AppData\Roaming\XenoManager\2431936813.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB46B.tmp" /F4⤵
- Creates scheduled task(s)
PID:3724
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD5dbb904188a321994906abe152659c567
SHA11a131923372bab101ca002c35544858fe3e2370c
SHA256ccd43cc5dbdd2dc786bdd89460c11ea5f55b4e8389b98e0bcd6400f614fe9d04
SHA51237cbba09369d94ce3d9852503c50a1cdc14a5646d8b4fdeca9bffd3d9284d8e0ceb2801ba458fdddf762f1a4058c5781d0a2f95452d3f7302e42abc5920238ef
-
Filesize
948B
MD5104f4faa257e15000d7abef040cf0af3
SHA12e3e7c3e47ad83ee6fe089d5bbc4f200f2de995e
SHA2561067119e5f3b3fff60d79e29edf0a2345534469114b49185533d9c65b0af2d05
SHA51245e11a709256ebfa694f6cfcaf88cb52ef60c4e84016fb37fbdc2e8761fd1eadbfa91881011e804e52dfe33986bd0a3104e1a643d05db7c029f6fa3fa0ab3088
-
Filesize
948B
MD5bdc0c67993f3d7ee47cf0765eed8b315
SHA1613f67e1441b9be51fa0c0c80cde0ee583e9bab9
SHA2567619e5f3aff33b8f08cf21b316c7f7d31b5581c8fe2aed48aac0c78a875dc18e
SHA512f43af2065141e7a4ded5aac2492fa5f56488f16d21ea25d89ea08181f727a03bf613894036ef30643c23747141f8b01dec96a305d8737bfa416c47e9737f0df8
-
Filesize
69KB
MD56bc7ab284910610872d47f9cf42a8d55
SHA10e774a524c0a4043c7988edef661ff9902fcceef
SHA256aa46487f9722d672ebcbdbd473d175ebe2608b5ac9cea822f33661fc43fa7cfc
SHA51297eb72a54a4a1c98a0338b77e12d9101bdf2b717ef345f9fe9c2e67066b94cbea48ede706a8995900fbd0e9ca42f27f7e2bbb676c6fbd427e9e9c6a01f152915
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD519abcdbaa818936bfd4d03cc70ba9b82
SHA158788e09aaecd44ebccda3a9accd76401413c411
SHA256b9c28b0ceedaa5725be43f201940d4d4602ed8f1df4b4120335bc1a05526762e
SHA512aad21fa677663957d29976001d3e16bf827a441ff881f4fec187737e50010e5db6ad39d2165982034bd36661a462e2820bbbab377e3732d7be7a4a9ad76360f0