Analysis
-
max time kernel
19s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 22:00
Errors
General
-
Target
monkey.exe
-
Size
45KB
-
MD5
5bf8a2aeedfb1123eb10af5e0f0e3302
-
SHA1
cdb9c4090f4ff8b9a5d94eaae30c15f4916e177a
-
SHA256
bf0927a0af35c23071466397ab21b38951d5847a4c7dda419d83a1a98183b12f
-
SHA512
3fa42409cea75c32b6323567fd7f03f10fd220fd73a93e4ba4d6bf998b228377e404d1a050f32e952b742c8d89a7e2384c14129608814711e285bfad33024983
-
SSDEEP
768:FdhO/poiiUcjlJInrVH9Xqk5nWEZ5SbTDazuI7CPW5j:bw+jjgnRH9XqcnW85SbT2uIb
Malware Config
Extracted
xenorat
147.185.221.20
TestingRat
-
install_path
appdata
-
port
3403
-
startup_name
Console
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation monkey.exe -
Executes dropped EXE 1 IoCs
pid Process 964 monkey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe 964 monkey.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 964 monkey.exe Token: SeShutdownPrivilege 964 monkey.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1576 wrote to memory of 964 1576 monkey.exe 82 PID 1576 wrote to memory of 964 1576 monkey.exe 82 PID 1576 wrote to memory of 964 1576 monkey.exe 82 PID 964 wrote to memory of 2368 964 monkey.exe 83 PID 964 wrote to memory of 2368 964 monkey.exe 83 PID 964 wrote to memory of 2368 964 monkey.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\monkey.exe"C:\Users\Admin\AppData\Local\Temp\monkey.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\XenoManager\monkey.exe"C:\Users\Admin\AppData\Roaming\XenoManager\monkey.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Console" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4575.tmp" /F3⤵
- Creates scheduled task(s)
PID:2368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5d2d5370e04de5428f88776f88d42a4fa
SHA1293a99701932f383f2d555ff754276682832593e
SHA2566a95327ef1dc4901039edd42fd94baa4455a4aac6839edaf0df89e962ec26b7b
SHA512dfa78ee247911031bd6ac5ae587288ac9342cb6077de50a16f3b18c4f73865dd972a2ef2940baffc9e037b8a84eb49f6ff3fc50f14f161d6bdac03f455215b8d
-
Filesize
45KB
MD55bf8a2aeedfb1123eb10af5e0f0e3302
SHA1cdb9c4090f4ff8b9a5d94eaae30c15f4916e177a
SHA256bf0927a0af35c23071466397ab21b38951d5847a4c7dda419d83a1a98183b12f
SHA5123fa42409cea75c32b6323567fd7f03f10fd220fd73a93e4ba4d6bf998b228377e404d1a050f32e952b742c8d89a7e2384c14129608814711e285bfad33024983