Analysis
-
max time kernel
127s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe
Resource
win7-20240221-en
General
-
Target
eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe
-
Size
242KB
-
MD5
a3f767e76c8c6baa9a154d576c7ba49d
-
SHA1
c9a2479bd372fd3ae569b67fc132eac6d5ad9ef0
-
SHA256
eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5
-
SHA512
6e567b6dab41a56eb777a06644e1f6ba0d80131ebcd03443e3b526ef5f7dfaaa3f41ee175a26e976d1b6deef4967d677ec71f87cc63a26559e39e1a6c46042ab
-
SSDEEP
6144:94OlpLX5KTcVgpod/a3gctM7lresEobLr49+I:igX5Pg2dC3ft+wsEobLr49j
Malware Config
Extracted
xenorat
dns.dobiamfollollc.online
Solid_rat_nd8889g
-
delay
61000
-
install_path
appdata
-
port
1283
-
startup_name
bns
Signatures
-
Detects executables packed with ConfuserEx Mod 4 IoCs
resource yara_rule behavioral1/memory/2012-1-0x00000000012A0000-0x00000000012E6000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2012-3-0x00000000005D0000-0x0000000000610000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/files/0x0033000000014b63-25.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2672-31-0x0000000000230000-0x0000000000276000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 4 IoCs
pid Process 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 2400 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 2428 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 2120 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2012 set thread context of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 set thread context of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 set thread context of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2672 set thread context of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 set thread context of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 set thread context of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe Token: SeDebugPrivilege 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 wrote to memory of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 wrote to memory of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 wrote to memory of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 wrote to memory of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 wrote to memory of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 wrote to memory of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 wrote to memory of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 wrote to memory of 2328 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 28 PID 2012 wrote to memory of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 wrote to memory of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 wrote to memory of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 wrote to memory of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 wrote to memory of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 wrote to memory of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 wrote to memory of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 wrote to memory of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 wrote to memory of 2148 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 29 PID 2012 wrote to memory of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2012 wrote to memory of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2012 wrote to memory of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2012 wrote to memory of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2012 wrote to memory of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2012 wrote to memory of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2012 wrote to memory of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2012 wrote to memory of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2012 wrote to memory of 2532 2012 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 30 PID 2532 wrote to memory of 2672 2532 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 31 PID 2532 wrote to memory of 2672 2532 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 31 PID 2532 wrote to memory of 2672 2532 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 31 PID 2532 wrote to memory of 2672 2532 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 31 PID 2672 wrote to memory of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 wrote to memory of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 wrote to memory of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 wrote to memory of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 wrote to memory of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 wrote to memory of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 wrote to memory of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 wrote to memory of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 wrote to memory of 2400 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 32 PID 2672 wrote to memory of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 wrote to memory of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 wrote to memory of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 wrote to memory of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 wrote to memory of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 wrote to memory of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 wrote to memory of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 wrote to memory of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 wrote to memory of 2428 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 33 PID 2672 wrote to memory of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 PID 2672 wrote to memory of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 PID 2672 wrote to memory of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 PID 2672 wrote to memory of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 PID 2672 wrote to memory of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 PID 2672 wrote to memory of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 PID 2672 wrote to memory of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 PID 2672 wrote to memory of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 PID 2672 wrote to memory of 2120 2672 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 34 PID 2328 wrote to memory of 2632 2328 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 37 PID 2328 wrote to memory of 2632 2328 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 37 PID 2328 wrote to memory of 2632 2328 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 37 PID 2328 wrote to memory of 2632 2328 eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe"C:\Users\Admin\AppData\Local\Temp\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exeC:\Users\Admin\AppData\Local\Temp\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "bns" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1600.tmp" /F3⤵
- Creates scheduled task(s)
PID:2632
-
-
-
C:\Users\Admin\AppData\Local\Temp\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exeC:\Users\Admin\AppData\Local\Temp\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe2⤵PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exeC:\Users\Admin\AppData\Local\Temp\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Roaming\XenoManager\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe"C:\Users\Admin\AppData\Roaming\XenoManager\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\XenoManager\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exeC:\Users\Admin\AppData\Roaming\XenoManager\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe4⤵
- Executes dropped EXE
PID:2400
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exeC:\Users\Admin\AppData\Roaming\XenoManager\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe4⤵
- Executes dropped EXE
PID:2428
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exeC:\Users\Admin\AppData\Roaming\XenoManager\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe4⤵
- Executes dropped EXE
PID:2120
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50a914966da6d56493c4fdbb3f171f5d1
SHA121842ca3800fc287e60402385157fe457407dccd
SHA256bff5a9357556eaf0c6b22793fd427ad42720ba5e110b4a6d81a6740685c8df72
SHA5128597df362d8774786af939cef436e29bf8bf71a6a24a6583ac38b4e462913a8994b499845f6dd0f9af8f836c30dc013088af151048fc767ff63c22012dcbdc8a
-
\Users\Admin\AppData\Roaming\XenoManager\eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5.exe
Filesize242KB
MD5a3f767e76c8c6baa9a154d576c7ba49d
SHA1c9a2479bd372fd3ae569b67fc132eac6d5ad9ef0
SHA256eb9a9a49e21219cdc673eb0b3266c2f4c2a759df7c17f4c19ede70e1d5b01dc5
SHA5126e567b6dab41a56eb777a06644e1f6ba0d80131ebcd03443e3b526ef5f7dfaaa3f41ee175a26e976d1b6deef4967d677ec71f87cc63a26559e39e1a6c46042ab