Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
6621fcab4de5fab7eac4d8d03c87f233.exe
Resource
win7-20240220-en
General
-
Target
6621fcab4de5fab7eac4d8d03c87f233.exe
-
Size
221KB
-
MD5
6621fcab4de5fab7eac4d8d03c87f233
-
SHA1
70dd77e26e803239877b30439eb123454bc137cc
-
SHA256
ac781121f63db7be4e5c79ea106118ce2c7a06f0abef01be3e54ff77351691e2
-
SHA512
d132d2399c65b6b0083f7172c04d4708b28b3deceb93fd0c5dfc5bcfdfd9ee459c5b46853d176e08e99a2a8842945e6cd396e4137fac430c67abea388e83789c
-
SSDEEP
6144:WdwDpybdvNg134Gnq2YZstYaGaqjWq9441D/Kv+I:/cE134GiZ4Ya7mWq9441D/Kvj
Malware Config
Extracted
xenorat
91.92.248.167
Wolid_rat_nd8859g
-
delay
60000
-
install_path
appdata
-
port
1280
-
startup_name
cms
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 2488 6621fcab4de5fab7eac4d8d03c87f233.exe 2816 6621fcab4de5fab7eac4d8d03c87f233.exe 3012 6621fcab4de5fab7eac4d8d03c87f233.exe -
Loads dropped DLL 4 IoCs
pid Process 2644 6621fcab4de5fab7eac4d8d03c87f233.exe 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 2460 6621fcab4de5fab7eac4d8d03c87f233.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2872 set thread context of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 set thread context of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 set thread context of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2460 set thread context of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 set thread context of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 set thread context of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1608 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2872 6621fcab4de5fab7eac4d8d03c87f233.exe Token: SeDebugPrivilege 2460 6621fcab4de5fab7eac4d8d03c87f233.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 wrote to memory of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 wrote to memory of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 wrote to memory of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 wrote to memory of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 wrote to memory of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 wrote to memory of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 wrote to memory of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 wrote to memory of 2560 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 28 PID 2872 wrote to memory of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 wrote to memory of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 wrote to memory of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 wrote to memory of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 wrote to memory of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 wrote to memory of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 wrote to memory of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 wrote to memory of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 wrote to memory of 2644 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 29 PID 2872 wrote to memory of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2872 wrote to memory of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2872 wrote to memory of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2872 wrote to memory of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2872 wrote to memory of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2872 wrote to memory of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2872 wrote to memory of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2872 wrote to memory of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2872 wrote to memory of 2756 2872 6621fcab4de5fab7eac4d8d03c87f233.exe 30 PID 2644 wrote to memory of 2460 2644 6621fcab4de5fab7eac4d8d03c87f233.exe 31 PID 2644 wrote to memory of 2460 2644 6621fcab4de5fab7eac4d8d03c87f233.exe 31 PID 2644 wrote to memory of 2460 2644 6621fcab4de5fab7eac4d8d03c87f233.exe 31 PID 2644 wrote to memory of 2460 2644 6621fcab4de5fab7eac4d8d03c87f233.exe 31 PID 2460 wrote to memory of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 wrote to memory of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 wrote to memory of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 wrote to memory of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 wrote to memory of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 wrote to memory of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 wrote to memory of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 wrote to memory of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 wrote to memory of 2488 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 32 PID 2460 wrote to memory of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 wrote to memory of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 wrote to memory of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 wrote to memory of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 wrote to memory of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 wrote to memory of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 wrote to memory of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 wrote to memory of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 wrote to memory of 2816 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 33 PID 2460 wrote to memory of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 PID 2460 wrote to memory of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 PID 2460 wrote to memory of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 PID 2460 wrote to memory of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 PID 2460 wrote to memory of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 PID 2460 wrote to memory of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 PID 2460 wrote to memory of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 PID 2460 wrote to memory of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 PID 2460 wrote to memory of 3012 2460 6621fcab4de5fab7eac4d8d03c87f233.exe 34 PID 2560 wrote to memory of 1608 2560 6621fcab4de5fab7eac4d8d03c87f233.exe 37 PID 2560 wrote to memory of 1608 2560 6621fcab4de5fab7eac4d8d03c87f233.exe 37 PID 2560 wrote to memory of 1608 2560 6621fcab4de5fab7eac4d8d03c87f233.exe 37 PID 2560 wrote to memory of 1608 2560 6621fcab4de5fab7eac4d8d03c87f233.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\6621fcab4de5fab7eac4d8d03c87f233.exe"C:\Users\Admin\AppData\Local\Temp\6621fcab4de5fab7eac4d8d03c87f233.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\6621fcab4de5fab7eac4d8d03c87f233.exeC:\Users\Admin\AppData\Local\Temp\6621fcab4de5fab7eac4d8d03c87f233.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "cms" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1526.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:1608
-
-
-
C:\Users\Admin\AppData\Local\Temp\6621fcab4de5fab7eac4d8d03c87f233.exeC:\Users\Admin\AppData\Local\Temp\6621fcab4de5fab7eac4d8d03c87f233.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Roaming\XenoManager\6621fcab4de5fab7eac4d8d03c87f233.exe"C:\Users\Admin\AppData\Roaming\XenoManager\6621fcab4de5fab7eac4d8d03c87f233.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Roaming\XenoManager\6621fcab4de5fab7eac4d8d03c87f233.exeC:\Users\Admin\AppData\Roaming\XenoManager\6621fcab4de5fab7eac4d8d03c87f233.exe4⤵
- Executes dropped EXE
PID:2488
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\6621fcab4de5fab7eac4d8d03c87f233.exeC:\Users\Admin\AppData\Roaming\XenoManager\6621fcab4de5fab7eac4d8d03c87f233.exe4⤵
- Executes dropped EXE
PID:2816
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\6621fcab4de5fab7eac4d8d03c87f233.exeC:\Users\Admin\AppData\Roaming\XenoManager\6621fcab4de5fab7eac4d8d03c87f233.exe4⤵
- Executes dropped EXE
PID:3012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6621fcab4de5fab7eac4d8d03c87f233.exeC:\Users\Admin\AppData\Local\Temp\6621fcab4de5fab7eac4d8d03c87f233.exe2⤵PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59bebe31e5ff2a5eae2b0cbbdb94e5a4f
SHA1731c8074c0b0d2280be5b1ff5d2ecdbaef82c803
SHA2564a7ceb2293c43dca1314f795c40bff88871639dc9db342b63841434ad691546e
SHA51274335ddfcb6b2bba86ecfb45a99ecfc85ec0d76ada26cb795346aab45b2190072147b6d7c345621a324db1ac1205bbb21698d5e23e71902857f92a02a946e05e
-
Filesize
221KB
MD56621fcab4de5fab7eac4d8d03c87f233
SHA170dd77e26e803239877b30439eb123454bc137cc
SHA256ac781121f63db7be4e5c79ea106118ce2c7a06f0abef01be3e54ff77351691e2
SHA512d132d2399c65b6b0083f7172c04d4708b28b3deceb93fd0c5dfc5bcfdfd9ee459c5b46853d176e08e99a2a8842945e6cd396e4137fac430c67abea388e83789c