Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 10:53
General
-
Target
sigma.exe
-
Size
45KB
-
MD5
04ebe5e1cd3f1f4ac07ccba6c357d5c7
-
SHA1
71ae4ea691a78283180f2a8a3c44d1f413fa44de
-
SHA256
1396bfabd8e337f2f2349d0c3fd6f4fdb925adeb2ead8357b61bb0896d9d618a
-
SHA512
d8f93cdc0c0d19bcf714640f71eb568e93c30b196815002edc719436ad7bddc81b57ec52de2b89109614e049334d445fb11ad564821d9c0bd500bc4535da39ed
-
SSDEEP
768:ldhO/poiiUcjlJInmjsZ8H9Xqk5nWEZ5SbTDaRuI7CPW5T:7w+jjgnMsZ8H9XqcnW85SbT8uIb
Malware Config
Extracted
xenorat
147.185.221.19:33365
Windows Seciurity
-
delay
5000
-
install_path
appdata
-
port
2137
-
startup_name
WIindows Security
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation sigma.exe -
Executes dropped EXE 1 IoCs
pid Process 1892 sigma.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4460 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1892 2332 sigma.exe 81 PID 2332 wrote to memory of 1892 2332 sigma.exe 81 PID 2332 wrote to memory of 1892 2332 sigma.exe 81 PID 1892 wrote to memory of 4460 1892 sigma.exe 82 PID 1892 wrote to memory of 4460 1892 sigma.exe 82 PID 1892 wrote to memory of 4460 1892 sigma.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\sigma.exe"C:\Users\Admin\AppData\Local\Temp\sigma.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Roaming\XenoManager\sigma.exe"C:\Users\Admin\AppData\Roaming\XenoManager\sigma.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "WIindows Security" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5813.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:4460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD566032aa5781de4895154a2b93e15815d
SHA13afdb800efb8896b3647de47265c0fb5819eb6ce
SHA25686cbcaac391b2315640f5205e9787c91d1333fd9ca951e1562f87697563e1979
SHA5122013c67df8656ac1166378fc210be99a479fb171e059e87653692a66d828bce105e245cf4f317b2b4e9bbc9592956b4290bef82b32030f8dcd55db56fe14de25
-
Filesize
45KB
MD504ebe5e1cd3f1f4ac07ccba6c357d5c7
SHA171ae4ea691a78283180f2a8a3c44d1f413fa44de
SHA2561396bfabd8e337f2f2349d0c3fd6f4fdb925adeb2ead8357b61bb0896d9d618a
SHA512d8f93cdc0c0d19bcf714640f71eb568e93c30b196815002edc719436ad7bddc81b57ec52de2b89109614e049334d445fb11ad564821d9c0bd500bc4535da39ed