Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
7c43077f843fcf5ad00e36587087929c73702171bfb36e4c5007ea54df09e37f.xll
Resource
win7-20240221-en
General
-
Target
7c43077f843fcf5ad00e36587087929c73702171bfb36e4c5007ea54df09e37f.xll
-
Size
820KB
-
MD5
0645646e6a417573d0047b6084e4632a
-
SHA1
d43adf73470cb151a61482d2e5d87f3fa1420717
-
SHA256
7c43077f843fcf5ad00e36587087929c73702171bfb36e4c5007ea54df09e37f
-
SHA512
36daebde0a113fae75301f4b3bc09860b6c17788e3f132cd25cf66b1d6b726bf6df4ba80add24009bc1d5fb566359d3e4be6d54456fbbe733059e106f5878f87
-
SSDEEP
12288:BG1N4HkcgMsiOd58bzbBSrePQ0uqZzD1reWabd/T7ppePgEKB9S4566Gwa:BoOOMX1/+QHT+d77ppqWB9S4Q6y
Malware Config
Extracted
Extracted
xenorat
91.92.248.167
Wolid_rat_nd8889g
-
delay
60000
-
install_path
appdata
-
port
1279
-
startup_name
qns
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe -
Executes dropped EXE 8 IoCs
pid Process 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 4568 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 2600 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3060 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3132 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 2840 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe -
Loads dropped DLL 2 IoCs
pid Process 2696 EXCEL.EXE 2696 EXCEL.EXE -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4088 set thread context of 4568 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 88 PID 4088 set thread context of 3288 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 89 PID 4088 set thread context of 2600 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 90 PID 1632 set thread context of 3060 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 92 PID 1632 set thread context of 3132 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 93 PID 1632 set thread context of 2840 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3548 3060 WerFault.exe 92 2460 2840 WerFault.exe 95 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3532 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2696 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2696 EXCEL.EXE 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2696 EXCEL.EXE Token: SeDebugPrivilege 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe Token: SeDebugPrivilege 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe Token: SeDebugPrivilege 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2696 EXCEL.EXE 2696 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2696 EXCEL.EXE 2696 EXCEL.EXE 2696 EXCEL.EXE 2696 EXCEL.EXE 2696 EXCEL.EXE 2696 EXCEL.EXE 2696 EXCEL.EXE 2696 EXCEL.EXE 2696 EXCEL.EXE 2696 EXCEL.EXE -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4088 2696 EXCEL.EXE 86 PID 2696 wrote to memory of 4088 2696 EXCEL.EXE 86 PID 2696 wrote to memory of 4088 2696 EXCEL.EXE 86 PID 4088 wrote to memory of 4568 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 88 PID 4088 wrote to memory of 4568 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 88 PID 4088 wrote to memory of 4568 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 88 PID 4088 wrote to memory of 4568 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 88 PID 4088 wrote to memory of 4568 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 88 PID 4088 wrote to memory of 4568 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 88 PID 4088 wrote to memory of 4568 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 88 PID 4088 wrote to memory of 4568 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 88 PID 4088 wrote to memory of 3288 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 89 PID 4088 wrote to memory of 3288 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 89 PID 4088 wrote to memory of 3288 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 89 PID 4088 wrote to memory of 3288 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 89 PID 4088 wrote to memory of 3288 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 89 PID 4088 wrote to memory of 3288 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 89 PID 4088 wrote to memory of 3288 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 89 PID 4088 wrote to memory of 3288 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 89 PID 4088 wrote to memory of 2600 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 90 PID 4088 wrote to memory of 2600 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 90 PID 4088 wrote to memory of 2600 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 90 PID 4088 wrote to memory of 2600 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 90 PID 4088 wrote to memory of 2600 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 90 PID 4088 wrote to memory of 2600 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 90 PID 4088 wrote to memory of 2600 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 90 PID 4088 wrote to memory of 2600 4088 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 90 PID 4568 wrote to memory of 1632 4568 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 91 PID 4568 wrote to memory of 1632 4568 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 91 PID 4568 wrote to memory of 1632 4568 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 91 PID 1632 wrote to memory of 3060 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 92 PID 1632 wrote to memory of 3060 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 92 PID 1632 wrote to memory of 3060 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 92 PID 1632 wrote to memory of 3060 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 92 PID 1632 wrote to memory of 3060 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 92 PID 1632 wrote to memory of 3060 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 92 PID 1632 wrote to memory of 3060 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 92 PID 1632 wrote to memory of 3060 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 92 PID 1632 wrote to memory of 3132 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 93 PID 1632 wrote to memory of 3132 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 93 PID 1632 wrote to memory of 3132 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 93 PID 1632 wrote to memory of 3132 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 93 PID 1632 wrote to memory of 3132 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 93 PID 1632 wrote to memory of 3132 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 93 PID 1632 wrote to memory of 3132 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 93 PID 1632 wrote to memory of 3132 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 93 PID 1632 wrote to memory of 2840 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 95 PID 1632 wrote to memory of 2840 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 95 PID 1632 wrote to memory of 2840 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 95 PID 1632 wrote to memory of 2840 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 95 PID 1632 wrote to memory of 2840 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 95 PID 1632 wrote to memory of 2840 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 95 PID 1632 wrote to memory of 2840 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 95 PID 1632 wrote to memory of 2840 1632 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 95 PID 3288 wrote to memory of 3532 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 109 PID 3288 wrote to memory of 3532 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 109 PID 3288 wrote to memory of 3532 3288 f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe 109
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7c43077f843fcf5ad00e36587087929c73702171bfb36e4c5007ea54df09e37f.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe"C:\Users\Admin\AppData\Local\Temp\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exeC:\Users\Admin\AppData\Local\Temp\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Roaming\XenoManager\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe"C:\Users\Admin\AppData\Roaming\XenoManager\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\XenoManager\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exeC:\Users\Admin\AppData\Roaming\XenoManager\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe5⤵
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 806⤵
- Program crash
PID:3548
-
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exeC:\Users\Admin\AppData\Roaming\XenoManager\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe5⤵
- Executes dropped EXE
PID:3132
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exeC:\Users\Admin\AppData\Roaming\XenoManager\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe5⤵
- Executes dropped EXE
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 806⤵
- Program crash
PID:2460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exeC:\Users\Admin\AppData\Local\Temp\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "qns" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3812.tmp" /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:3532
-
-
-
C:\Users\Admin\AppData\Local\Temp\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exeC:\Users\Admin\AppData\Local\Temp\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe3⤵
- Executes dropped EXE
PID:2600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3060 -ip 30601⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2840 -ip 28401⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f0efa263-19e0-4cb2-ae3e-508e0a63243c.exe.log
Filesize522B
MD58334a471a4b492ece225b471b8ad2fc8
SHA11cb24640f32d23e8f7800bd0511b7b9c3011d992
SHA2565612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169
SHA51256ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36
-
C:\Users\Admin\AppData\Local\Temp\7c43077f843fcf5ad00e36587087929c73702171bfb36e4c5007ea54df09e37f.xll
Filesize820KB
MD50645646e6a417573d0047b6084e4632a
SHA1d43adf73470cb151a61482d2e5d87f3fa1420717
SHA2567c43077f843fcf5ad00e36587087929c73702171bfb36e4c5007ea54df09e37f
SHA51236daebde0a113fae75301f4b3bc09860b6c17788e3f132cd25cf66b1d6b726bf6df4ba80add24009bc1d5fb566359d3e4be6d54456fbbe733059e106f5878f87
-
Filesize
234KB
MD5a19378142ff17ef4a4cef4add24b10aa
SHA16231b66cdbea1a29043dfee2bfc4772b241bae98
SHA256789cec98f94a74b862783c6f3a41794f375b775b81f291798fde8b3653e96bb9
SHA5120eefc81ff23ac4e02d85fce6c0d10d819f6856d6ac19b0df28e786242f6cc158bbee057fc2097e5b44caafd58d6e7b8ccd4063f40fedd8eb5e4be3d3d16de1c1
-
Filesize
1KB
MD50c753b27b913b3ead1a53b8c5fbb0af3
SHA16565542e303a8aa6f44f6b2a7caea3af3998c423
SHA256a9eb0433b114bbc862ea02c401fff29513f1db0d7bbc271ef16a6a7dd4d5ef37
SHA512c4251d8c759d8e4c95adca37d010019f74dcc90d33927c1dcb81be270144c7af2fa027ee53c64edcb5aa1f788b105be1d61bd6af4e6b63ed70cd99bbdb47512e