Analysis Overview
SHA256
2b83224eb8a3b749f36c78780d727898233e371572269af2d0853c63d470cfee
Threat Level: Known bad
The file 2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch was found to be: Known bad.
Malicious Activity Summary
Detects executables containing possible sandbox system UUIDs
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
XenorRat
Detects executables referencing virtualization MAC addresses
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Detects executables manipulated with Fody
Modifies Windows Firewall
Command and Scripting Interpreter: PowerShell
Reads user/profile data of web browsers
Checks computer location settings
Executes dropped EXE
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Creates scheduled task(s)
Suspicious use of SetWindowsHookEx
Views/modifies file attributes
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-18 08:41
Signatures
Detects executables containing possible sandbox system UUIDs
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Detects executables referencing virtualization MAC addresses
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-18 08:41
Reported
2024-05-18 08:44
Platform
win7-20240508-en
Max time kernel
121s
Max time network
130s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe
"C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe"
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-18 08:41
Reported
2024-05-18 08:43
Platform
win10v2004-20240426-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
XenorRat
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Detects executables manipulated with Fody
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3886209194.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3886209194.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe | N/A |
Reads user/profile data of web browsers
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe | N/A |
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\attrib.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe
"C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionExtension C:\Users\Admin\AppData\Local\Temp\*.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -PUAProtection 0
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -SubmitSamplesConsent 2
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -DisableRealtimeMonitoring $true
C:\Windows\system32\cmd.exe
cmd /C netsh advfirewall set allprofiles state off
C:\Windows\system32\netsh.exe
netsh advfirewall set allprofiles state off
C:\Windows\system32\attrib.exe
attrib +h +s C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe
C:\Users\Admin\AppData\Local\Temp\3886209194.exe
C:\Users\Admin\AppData\Local\Temp\3886209194.exe
C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe
"C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp784D.tmp" /F
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.159.190.20.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 69.46.15.141:4444 | tcp | |
| US | 8.8.8.8:53 | 141.15.46.69.in-addr.arpa | udp |
| US | 69.46.15.141:4444 | tcp | |
| US | 69.46.15.141:4444 | tcp | |
| US | 69.46.15.141:4444 | tcp | |
| US | 69.46.15.141:4444 | tcp | |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
Files
memory/4076-0-0x00007FFA58B13000-0x00007FFA58B15000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2azqikd4.0yk.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/4076-10-0x0000020D329D0000-0x0000020D329F2000-memory.dmp
memory/4076-11-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp
memory/4076-12-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp
memory/4076-15-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | d85ba6ff808d9e5444a4b369f5bc2730 |
| SHA1 | 31aa9d96590fff6981b315e0b391b575e4c0804a |
| SHA256 | 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f |
| SHA512 | 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249 |
memory/5912-27-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | cadef9abd087803c630df65264a6c81c |
| SHA1 | babbf3636c347c8727c35f3eef2ee643dbcc4bd2 |
| SHA256 | cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438 |
| SHA512 | 7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085 |
memory/5912-28-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp
memory/5912-29-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp
memory/5912-31-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | d8cb3e9459807e35f02130fad3f9860d |
| SHA1 | 5af7f32cb8a30e850892b15e9164030a041f4bd6 |
| SHA256 | 2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68 |
| SHA512 | 045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | c65738617888921a153bd9b1ef516ee7 |
| SHA1 | 5245e71ea3c181d76320c857b639272ac9e079b1 |
| SHA256 | 4640ba4001fd16a593315299cbdd4988dc2c7075820687f1018aac40aca95c26 |
| SHA512 | 2e2a0ebd93f9d8dd07a7599054bce232683e9add9a35e77b584618040bcfd84a42545352519ec4736cc379002210b6f3ed2d905591c6925c0981b0392b495bfa |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | c1a54dd5a1ab44cc4c4afd42f291c863 |
| SHA1 | b77043ab3582680fc96192e9d333a6be0ae0f69d |
| SHA256 | c6dce870a896f3531ae7a10a0c2096d2eb7eb5989ae783aefea6150279502d75 |
| SHA512 | 010f5093f58b0393d17c824a357513cf4f06239ccddd86c2e0581347ef3b8e7b93f869b0770bdaeb000e4fda7e14f49b9e45663a3839ab049446e9fe08ec535d |
C:\Users\Admin\AppData\Local\Temp\3886209194.exe
| MD5 | 6bc7ab284910610872d47f9cf42a8d55 |
| SHA1 | 0e774a524c0a4043c7988edef661ff9902fcceef |
| SHA256 | aa46487f9722d672ebcbdbd473d175ebe2608b5ac9cea822f33661fc43fa7cfc |
| SHA512 | 97eb72a54a4a1c98a0338b77e12d9101bdf2b717ef345f9fe9c2e67066b94cbea48ede706a8995900fbd0e9ca42f27f7e2bbb676c6fbd427e9e9c6a01f152915 |
memory/5500-71-0x00000000005D0000-0x00000000005E8000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3886209194.exe.log
| MD5 | 916851e072fbabc4796d8916c5131092 |
| SHA1 | d48a602229a690c512d5fdaf4c8d77547a88e7a2 |
| SHA256 | 7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d |
| SHA512 | 07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521 |
C:\Users\Admin\AppData\Local\Temp\tmp784D.tmp
| MD5 | 84453390984eaaae54c58bd900b714d8 |
| SHA1 | 4463bc46557f700335fa245f76ce0b58abc65a25 |
| SHA256 | 44d1a263d002d35545c1be91fc51f9d97d869bd508a02d44f5e13ba5df339443 |
| SHA512 | c51b3af815827c33ad8e02fd5e08276dc7c6bc653559ba09412fdae8470271328092b833bc14794d189cfeef30b2d54c64a844afb1e5cd73c0cf70cf287cec24 |
memory/5292-87-0x00000000053E0000-0x0000000005446000-memory.dmp
memory/5292-88-0x0000000005790000-0x000000000579C000-memory.dmp
memory/5292-89-0x0000000005E90000-0x0000000006434000-memory.dmp
memory/5292-90-0x0000000005AF0000-0x0000000005B82000-memory.dmp
memory/5292-91-0x0000000005AD0000-0x0000000005ADA000-memory.dmp
memory/5292-92-0x0000000006540000-0x000000000663A000-memory.dmp
memory/5292-93-0x0000000006810000-0x00000000069D2000-memory.dmp
memory/5292-94-0x0000000006640000-0x0000000006690000-memory.dmp
memory/5292-95-0x0000000006710000-0x0000000006786000-memory.dmp
memory/5292-96-0x0000000006F10000-0x000000000743C000-memory.dmp
memory/5292-97-0x00000000067F0000-0x000000000680E000-memory.dmp
memory/5292-99-0x0000000006B00000-0x0000000006B9C000-memory.dmp