Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
fechas de pago.scr.exe
Resource
win7-20240611-en
General
-
Target
fechas de pago.scr.exe
-
Size
239KB
-
MD5
1f89375dede098a5f59710c111594b8d
-
SHA1
e782a9abdd7ceed63a6a10b83a16c278400f9b32
-
SHA256
6f5b287c87ff655d6d07686fc8328e1c7e4dd2ca99caca5c757300a8d4b1940b
-
SHA512
94e856096bb44e70cd04c308e5f2647cbc64990bb765d40e4e1fae9d1a0b3de3e7cfc6949297ebf19450ed2f11e2754bab55573f1d64ff1d7f599230c01ae960
-
SSDEEP
6144:QQDn9LAsrPf1xTjlMk1y+fn0fTm6wJm2rrFOI:NDnx/zfjnH1x0fTm6wJm2rrh
Malware Config
Extracted
xenorat
91.92.248.167
Dolid_rat_nd8859g
-
delay
60000
-
install_path
appdata
-
port
1280
-
startup_name
dms
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation fechas de pago.scr.exe -
Executes dropped EXE 4 IoCs
pid Process 5008 fechas de pago.scr.exe 1168 fechas de pago.scr.exe 2536 fechas de pago.scr.exe 3512 fechas de pago.scr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3508 set thread context of 2840 3508 fechas de pago.scr.exe 83 PID 3508 set thread context of 3596 3508 fechas de pago.scr.exe 84 PID 3508 set thread context of 4092 3508 fechas de pago.scr.exe 85 PID 5008 set thread context of 1168 5008 fechas de pago.scr.exe 90 PID 5008 set thread context of 2536 5008 fechas de pago.scr.exe 91 PID 5008 set thread context of 3512 5008 fechas de pago.scr.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1056 3596 WerFault.exe 84 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe 4092 fechas de pago.scr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3508 fechas de pago.scr.exe Token: SeDebugPrivilege 5008 fechas de pago.scr.exe Token: SeDebugPrivilege 4092 fechas de pago.scr.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3508 wrote to memory of 2840 3508 fechas de pago.scr.exe 83 PID 3508 wrote to memory of 2840 3508 fechas de pago.scr.exe 83 PID 3508 wrote to memory of 2840 3508 fechas de pago.scr.exe 83 PID 3508 wrote to memory of 2840 3508 fechas de pago.scr.exe 83 PID 3508 wrote to memory of 2840 3508 fechas de pago.scr.exe 83 PID 3508 wrote to memory of 2840 3508 fechas de pago.scr.exe 83 PID 3508 wrote to memory of 2840 3508 fechas de pago.scr.exe 83 PID 3508 wrote to memory of 2840 3508 fechas de pago.scr.exe 83 PID 3508 wrote to memory of 3596 3508 fechas de pago.scr.exe 84 PID 3508 wrote to memory of 3596 3508 fechas de pago.scr.exe 84 PID 3508 wrote to memory of 3596 3508 fechas de pago.scr.exe 84 PID 3508 wrote to memory of 3596 3508 fechas de pago.scr.exe 84 PID 3508 wrote to memory of 3596 3508 fechas de pago.scr.exe 84 PID 3508 wrote to memory of 3596 3508 fechas de pago.scr.exe 84 PID 3508 wrote to memory of 3596 3508 fechas de pago.scr.exe 84 PID 3508 wrote to memory of 3596 3508 fechas de pago.scr.exe 84 PID 3508 wrote to memory of 4092 3508 fechas de pago.scr.exe 85 PID 3508 wrote to memory of 4092 3508 fechas de pago.scr.exe 85 PID 3508 wrote to memory of 4092 3508 fechas de pago.scr.exe 85 PID 3508 wrote to memory of 4092 3508 fechas de pago.scr.exe 85 PID 3508 wrote to memory of 4092 3508 fechas de pago.scr.exe 85 PID 3508 wrote to memory of 4092 3508 fechas de pago.scr.exe 85 PID 3508 wrote to memory of 4092 3508 fechas de pago.scr.exe 85 PID 3508 wrote to memory of 4092 3508 fechas de pago.scr.exe 85 PID 2840 wrote to memory of 5008 2840 fechas de pago.scr.exe 88 PID 2840 wrote to memory of 5008 2840 fechas de pago.scr.exe 88 PID 2840 wrote to memory of 5008 2840 fechas de pago.scr.exe 88 PID 5008 wrote to memory of 1168 5008 fechas de pago.scr.exe 90 PID 5008 wrote to memory of 1168 5008 fechas de pago.scr.exe 90 PID 5008 wrote to memory of 1168 5008 fechas de pago.scr.exe 90 PID 5008 wrote to memory of 1168 5008 fechas de pago.scr.exe 90 PID 5008 wrote to memory of 1168 5008 fechas de pago.scr.exe 90 PID 5008 wrote to memory of 1168 5008 fechas de pago.scr.exe 90 PID 5008 wrote to memory of 1168 5008 fechas de pago.scr.exe 90 PID 5008 wrote to memory of 1168 5008 fechas de pago.scr.exe 90 PID 5008 wrote to memory of 2536 5008 fechas de pago.scr.exe 91 PID 5008 wrote to memory of 2536 5008 fechas de pago.scr.exe 91 PID 5008 wrote to memory of 2536 5008 fechas de pago.scr.exe 91 PID 5008 wrote to memory of 2536 5008 fechas de pago.scr.exe 91 PID 5008 wrote to memory of 2536 5008 fechas de pago.scr.exe 91 PID 5008 wrote to memory of 2536 5008 fechas de pago.scr.exe 91 PID 5008 wrote to memory of 2536 5008 fechas de pago.scr.exe 91 PID 5008 wrote to memory of 2536 5008 fechas de pago.scr.exe 91 PID 5008 wrote to memory of 3512 5008 fechas de pago.scr.exe 92 PID 5008 wrote to memory of 3512 5008 fechas de pago.scr.exe 92 PID 5008 wrote to memory of 3512 5008 fechas de pago.scr.exe 92 PID 5008 wrote to memory of 3512 5008 fechas de pago.scr.exe 92 PID 5008 wrote to memory of 3512 5008 fechas de pago.scr.exe 92 PID 5008 wrote to memory of 3512 5008 fechas de pago.scr.exe 92 PID 5008 wrote to memory of 3512 5008 fechas de pago.scr.exe 92 PID 5008 wrote to memory of 3512 5008 fechas de pago.scr.exe 92 PID 4092 wrote to memory of 4568 4092 fechas de pago.scr.exe 102 PID 4092 wrote to memory of 4568 4092 fechas de pago.scr.exe 102 PID 4092 wrote to memory of 4568 4092 fechas de pago.scr.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"4⤵
- Executes dropped EXE
PID:1168
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"4⤵
- Executes dropped EXE
PID:2536
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"4⤵
- Executes dropped EXE
PID:3512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"2⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 803⤵
- Program crash
PID:1056
-
-
-
C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "dms" /XML "C:\Users\Admin\AppData\Local\Temp\tmp56A7.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:4568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3596 -ip 35961⤵PID:3464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD58334a471a4b492ece225b471b8ad2fc8
SHA11cb24640f32d23e8f7800bd0511b7b9c3011d992
SHA2565612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169
SHA51256ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36
-
Filesize
152KB
MD573bd1e15afb04648c24593e8ba13e983
SHA14dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA5126eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
1KB
MD515353a3bb0a5c558a81376bcdfdc6ad6
SHA136156e5bd828094aacba26b60214420192009f01
SHA25666d9195ec358a9736be2517f55b02206baa72c2d08512474f474773bbef6ef3a
SHA512331585e484b39553b5bb51745db450f46b1b75c04610eb50d1824a3a25c29c1c235212b52b1772205ce5c80643a77ef78eba3c3999cf2828c3645862e06cabb4
-
Filesize
239KB
MD51f89375dede098a5f59710c111594b8d
SHA1e782a9abdd7ceed63a6a10b83a16c278400f9b32
SHA2566f5b287c87ff655d6d07686fc8328e1c7e4dd2ca99caca5c757300a8d4b1940b
SHA51294e856096bb44e70cd04c308e5f2647cbc64990bb765d40e4e1fae9d1a0b3de3e7cfc6949297ebf19450ed2f11e2754bab55573f1d64ff1d7f599230c01ae960