Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 11:41

General

  • Target

    fechas de pago.scr.exe

  • Size

    240KB

  • MD5

    cc5b6e9deec470d26e074859ca794aca

  • SHA1

    0cf0d409f644c3712299b0c91ea249537d51ff45

  • SHA256

    249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99

  • SHA512

    bd97b5d8ef82d68dc1d0a2162375a6515b927be95e99dd6a4a725172da885eff4e162d80ad4bbac30b579d6e9fa3d6d73f452716239d61b7c01803afa653959d

  • SSDEEP

    6144:suCZay34VffBhW5JDo4mLDiBRnB7/Z8rnA++gQj79toI:JCF0f/O+4m6vkrnA++gQj79T

Malware Config

Extracted

Family

xenorat

C2

91.92.248.167

Mutex

Dolid_rat_nd8859g

Attributes
  • delay

    60000

  • install_path

    appdata

  • port

    1280

  • startup_name

    dms

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
    "C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
      "C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
      2⤵
        PID:3192
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 80
          3⤵
          • Program crash
          PID:1536
      • C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
        "C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
        2⤵
          PID:4008
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 72
            3⤵
            • Program crash
            PID:4224
        • C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe
          "C:\Users\Admin\AppData\Local\Temp\fechas de pago.scr.exe"
          2⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3176
          • C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
            "C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1984
            • C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
              "C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
              4⤵
              • Executes dropped EXE
              PID:1204
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 80
                5⤵
                • Program crash
                PID:2448
            • C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
              "C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
              4⤵
              • Executes dropped EXE
              PID:1888
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 152
                5⤵
                • Program crash
                PID:3988
            • C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe
              "C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2184
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks.exe" /Create /TN "dms" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3459.tmp" /F
                5⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2384
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4008 -ip 4008
        1⤵
          PID:1508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3192 -ip 3192
          1⤵
            PID:3464
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1204 -ip 1204
            1⤵
              PID:3200
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1888 -ip 1888
              1⤵
                PID:912

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fechas de pago.scr.exe.log

                Filesize

                522B

                MD5

                8334a471a4b492ece225b471b8ad2fc8

                SHA1

                1cb24640f32d23e8f7800bd0511b7b9c3011d992

                SHA256

                5612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169

                SHA512

                56ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36

              • C:\Users\Admin\AppData\Local\Temp\cqdm3a3c.sum

                Filesize

                124KB

                MD5

                9618e15b04a4ddb39ed6c496575f6f95

                SHA1

                1c28f8750e5555776b3c80b187c5d15a443a7412

                SHA256

                a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                SHA512

                f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

              • C:\Users\Admin\AppData\Local\Temp\ryfn5r2f.i2w

                Filesize

                152KB

                MD5

                73bd1e15afb04648c24593e8ba13e983

                SHA1

                4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91

                SHA256

                aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b

                SHA512

                6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

              • C:\Users\Admin\AppData\Local\Temp\tmp3459.tmp

                Filesize

                1KB

                MD5

                8c9b557a6488ef9093caaccc60cc4223

                SHA1

                31a072f552d65a4d60ee025b8a70d654d3093009

                SHA256

                5a3ceafb68e10422476e8a783acd0b5881e6a21aa7f951841c54ad3cf138c357

                SHA512

                d07dabd8a01eebc2c10e3a82f157c300e5c2307a3aa5af69ddf8c47408a0f8db98e053204b69cace2da3314605de507b4ba54b010bafec6e8cf3c6de48cbb087

              • C:\Users\Admin\AppData\Roaming\XenoManager\fechas de pago.scr.exe

                Filesize

                240KB

                MD5

                cc5b6e9deec470d26e074859ca794aca

                SHA1

                0cf0d409f644c3712299b0c91ea249537d51ff45

                SHA256

                249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99

                SHA512

                bd97b5d8ef82d68dc1d0a2162375a6515b927be95e99dd6a4a725172da885eff4e162d80ad4bbac30b579d6e9fa3d6d73f452716239d61b7c01803afa653959d

              • memory/1984-33-0x0000000074D30000-0x00000000754E0000-memory.dmp

                Filesize

                7.7MB

              • memory/1984-26-0x0000000074D30000-0x00000000754E0000-memory.dmp

                Filesize

                7.7MB

              • memory/1984-25-0x0000000074D30000-0x00000000754E0000-memory.dmp

                Filesize

                7.7MB

              • memory/2184-37-0x0000000005A80000-0x0000000005B7A000-memory.dmp

                Filesize

                1000KB

              • memory/2184-40-0x0000000005C90000-0x0000000005CE0000-memory.dmp

                Filesize

                320KB

              • memory/2184-42-0x0000000006090000-0x00000000060AE000-memory.dmp

                Filesize

                120KB

              • memory/2184-41-0x0000000006450000-0x000000000697C000-memory.dmp

                Filesize

                5.2MB

              • memory/2184-39-0x0000000005C10000-0x0000000005C86000-memory.dmp

                Filesize

                472KB

              • memory/2184-38-0x0000000005D50000-0x0000000005F12000-memory.dmp

                Filesize

                1.8MB

              • memory/2184-36-0x0000000005810000-0x0000000005876000-memory.dmp

                Filesize

                408KB

              • memory/3176-24-0x0000000074D30000-0x00000000754E0000-memory.dmp

                Filesize

                7.7MB

              • memory/3176-12-0x0000000074D30000-0x00000000754E0000-memory.dmp

                Filesize

                7.7MB

              • memory/3176-8-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/4172-4-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                Filesize

                248KB

              • memory/4172-3-0x0000000074D30000-0x00000000754E0000-memory.dmp

                Filesize

                7.7MB

              • memory/4172-5-0x000000000D930000-0x000000000D9CC000-memory.dmp

                Filesize

                624KB

              • memory/4172-0-0x0000000074D3E000-0x0000000074D3F000-memory.dmp

                Filesize

                4KB

              • memory/4172-6-0x0000000004770000-0x0000000004776000-memory.dmp

                Filesize

                24KB

              • memory/4172-13-0x0000000074D30000-0x00000000754E0000-memory.dmp

                Filesize

                7.7MB

              • memory/4172-2-0x0000000002750000-0x0000000002756000-memory.dmp

                Filesize

                24KB

              • memory/4172-1-0x0000000000320000-0x0000000000360000-memory.dmp

                Filesize

                256KB