Analysis
-
max time kernel
30s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
lool.bat
Resource
win7-20240508-en
General
-
Target
lool.bat
-
Size
75KB
-
MD5
210c28d7e7091f344df74d092b50ed4a
-
SHA1
6ed289b6635ca3a6cfcdf30f2bd2c9e6e7712a11
-
SHA256
2c979bce124c9b38ddc271abd603b742b6b998b4e2df27e5c3260cb4bbe24031
-
SHA512
21771f1243ad54c69b9c3ad841dcf791e68015764870b6cdf9b483fa7f601d65adc9782af80a99c5df58b3a538d2789bdbf732b744790936d5abd28dc1d08659
-
SSDEEP
1536:um3tLk9b1GjzKddsAjcYy2B815PiJJbkizNvPSPviQLxw:uqz1S5vQA
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
7788
-
startup_name
lol
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation x.exe -
Executes dropped EXE 2 IoCs
pid Process 1272 x.exe 4456 x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2352 schtasks.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1308 wrote to memory of 532 1308 cmd.exe 86 PID 1308 wrote to memory of 532 1308 cmd.exe 86 PID 1308 wrote to memory of 4584 1308 cmd.exe 87 PID 1308 wrote to memory of 4584 1308 cmd.exe 87 PID 1308 wrote to memory of 1272 1308 cmd.exe 88 PID 1308 wrote to memory of 1272 1308 cmd.exe 88 PID 1308 wrote to memory of 1272 1308 cmd.exe 88 PID 1272 wrote to memory of 4456 1272 x.exe 89 PID 1272 wrote to memory of 4456 1272 x.exe 89 PID 1272 wrote to memory of 4456 1272 x.exe 89 PID 4456 wrote to memory of 2352 4456 x.exe 90 PID 4456 wrote to memory of 2352 4456 x.exe 90 PID 4456 wrote to memory of 2352 4456 x.exe 90
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\lool.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\system32\findstr.exefindstr /e "'v" "C:\Users\Admin\AppData\Local\Temp\lool.bat"2⤵PID:532
-
-
C:\Windows\system32\cscript.execscript //nologo C:\Users\Admin\AppData\Local\Temp\x.vbs2⤵PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\x.exeC:\Users\Admin\AppData\Local\Temp\x.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Roaming\XenoManager\x.exe"C:\Users\Admin\AppData\Roaming\XenoManager\x.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "lol" /XML "C:\Users\Admin\AppData\Local\Temp\tmp68FB.tmp" /F4⤵
- Creates scheduled task(s)
PID:2352
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD50d56c8b55981340ffccdfc4fdc5e8f34
SHA152b649f6cf05225c3e2816028c4328b589afe1a4
SHA256da61b813aeb372324e29b32c5f5bf6059a1e9734e838c6bfe65e4dfbc631a3ca
SHA5125ee0384c2e6b9f76609d01aff3cfd346a1e01696a2b644e682da049c92ca8c4c2995ba8f1c8df8e0b15f7cc56989a8833cb4a890ca5a16cb03fc7cc239b79b9d
-
Filesize
4KB
MD5afc9d6ee61525f103d640290d4f33499
SHA1850c748365d8e3ce2d724ce1b2f92f5629bb0ed7
SHA256cb460e45c1015ef7b51ea09323169f04ee5d10e782762d24eaee99217bdd5747
SHA512f202d0a127ada98854fd52a9ab06e35f8330bd7869bca5a685be0407106c7a527667aabd13694eea52087abe9a4aca4aaa5f3361ccea4e1d5b15a064d61a1f28
-
Filesize
62KB
MD51821eb47df91d5cb462841ec783c3583
SHA1009e3c0dc9d8d6e8e23605810c9f184703ef3bc9
SHA256ad2ac4c76a314f402bfab75d4bf0b01b5acc2b7048170f849a1245aebccda69d
SHA512b087033b816410e5425f6c16c5a4dfce9b3b1dbac27094e055fe81e5b64ab439d54c5c07965476ec99f9577cd644c05f8e2d0a7514846fc80353eb2d1646cb55
-
Filesize
45KB
MD5688d041d85af4d0c5063bed1e9147f57
SHA1e67fbf716a7622f2ce8f016b8843d228d023e3ba
SHA256b96a56bd3aeb0f9c7e71ec19d9170b7e0a6e2f647c2cbebc0789866f2ec09458
SHA51279a55b5b6df46a95e82d1085893f8979e0f4c39e3dedbe3d4efeabde0274eef37c6a56a76b92c96a0dcb1dcd48648a4ed55209eab91d1cff45e7898564fe1720
-
Filesize
380B
MD5ec9a2fb69a379d913a4e0a953cd3b97c
SHA1a0303ed9f787c042071a1286bba43a5bbdd0679e
SHA256cf8268d158bb819ef158ff6ccbed64d5e379148a0adb1f73a082a01d56d0286b
SHA512fef8e24a680991046bd7dacd6079c7e48c3031fe46caae722ea93797ee16c052073ba97959e992ea71ac7ab72fbcedaa5cf4a410657aac4c10ad24de6935e9d6