Analysis
-
max time kernel
107s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 23:53
General
-
Target
testingrat.exe
-
Size
45KB
-
MD5
7bf7d5fb2ed513c687cd676fe53f5ee9
-
SHA1
e9251ef1dd3ebe4f17acf0b3552e22751009c8c1
-
SHA256
afe1cd83d722daa13601c0de896cec93dbae4f9ce4ad78ca3b845060101f0101
-
SHA512
4c189aee06185359827432b021e8850b1bfbc78da932c4b259b665de7a1b293e0ee281627750bcce7e4fb2ccd8b2b8c0f89a7d68b77e27e7e52832a887f0f447
-
SSDEEP
768:ldhO/poiiUcjlJInVqH9Xqk5nWEZ5SbTDamWI7CPW5K:7w+jjgn8H9XqcnW85SbTvWIi
Malware Config
Extracted
xenorat
related-directed.gl.at.ply.gg
TestingRat
-
install_path
appdata
-
port
3403
-
startup_name
Console
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation testingrat.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 testingrat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3228 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2388 1596 testingrat.exe 82 PID 1596 wrote to memory of 2388 1596 testingrat.exe 82 PID 1596 wrote to memory of 2388 1596 testingrat.exe 82 PID 2388 wrote to memory of 3228 2388 testingrat.exe 83 PID 2388 wrote to memory of 3228 2388 testingrat.exe 83 PID 2388 wrote to memory of 3228 2388 testingrat.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\testingrat.exe"C:\Users\Admin\AppData\Local\Temp\testingrat.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\XenoManager\testingrat.exe"C:\Users\Admin\AppData\Roaming\XenoManager\testingrat.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Console" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5544.tmp" /F3⤵
- Creates scheduled task(s)
PID:3228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5eda61e8aea78084b221c5e803874884a
SHA1030505a2e13c578d3b856df4e4293767ac1e4308
SHA256d499b32d1e31c3b4c0079d1111a0f46f218aae50ad95b93ee89fd564dd75efc0
SHA512410b6d505a3407540b51ae11c908aefa1556620c828541653695267fb61fc0a5dffaf22288041d98a3c18e1acca6774dd048ac1d508c327f5b6080bc27367e71
-
Filesize
45KB
MD57bf7d5fb2ed513c687cd676fe53f5ee9
SHA1e9251ef1dd3ebe4f17acf0b3552e22751009c8c1
SHA256afe1cd83d722daa13601c0de896cec93dbae4f9ce4ad78ca3b845060101f0101
SHA5124c189aee06185359827432b021e8850b1bfbc78da932c4b259b665de7a1b293e0ee281627750bcce7e4fb2ccd8b2b8c0f89a7d68b77e27e7e52832a887f0f447