Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 17:04
Behavioral task
behavioral1
Sample
BEForcer.exe
Resource
win7-20240221-en
General
-
Target
BEForcer.exe
-
Size
45KB
-
MD5
888405f1ed21b89ac08343458251bf26
-
SHA1
4c9b54da2336376441af26ed4bedcd6fda1b316f
-
SHA256
a8b6f84c5a83b221cb27203a565852745db0010e793aedfe2e98db4cd7f10859
-
SHA512
4280eddeaba17692a542ab11e1ad92cde5aedd0857990bea01dbd967334801318fd5c31519e58af021ff07c7cf37c2cea6c99502d7f7c1b26852cfb935e3a2a1
-
SSDEEP
768:1dhO/poiiUcjlJInYqH9Xqk5nWEZ5SbTDa3WI7CPW5R:Lw+jjgnzH9XqcnW85SbTGWI5
Malware Config
Extracted
xenorat
23.243.100.240
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Windows Security
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 BEForcer.exe -
Loads dropped DLL 1 IoCs
pid Process 2964 BEForcer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2016 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2052 2964 BEForcer.exe 28 PID 2964 wrote to memory of 2052 2964 BEForcer.exe 28 PID 2964 wrote to memory of 2052 2964 BEForcer.exe 28 PID 2964 wrote to memory of 2052 2964 BEForcer.exe 28 PID 2052 wrote to memory of 2016 2052 BEForcer.exe 29 PID 2052 wrote to memory of 2016 2052 BEForcer.exe 29 PID 2052 wrote to memory of 2016 2052 BEForcer.exe 29 PID 2052 wrote to memory of 2016 2052 BEForcer.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\BEForcer.exe"C:\Users\Admin\AppData\Local\Temp\BEForcer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\XenoManager\BEForcer.exe"C:\Users\Admin\AppData\Roaming\XenoManager\BEForcer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Security" /XML "C:\Users\Admin\AppData\Local\Temp\tmp24DF.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f78d2f389b8f658fde9e7f33dee66c15
SHA1d222b225e0d734b93a2b04e4fdbaf4910ed4e69d
SHA256f1bef8ec4cd223f9278b0f54af5579aa335966ac6d0588f27aa9b8f3d3d6d786
SHA512b31f9e7c1ef8ae4bf0eb61fdad582908aadd35367855e71cb9f0c1e957dd4c7276262b6f483cd16836aa0ff7897f34de4b6039daa41a8a183ae0ea2a156c275c
-
Filesize
45KB
MD5888405f1ed21b89ac08343458251bf26
SHA14c9b54da2336376441af26ed4bedcd6fda1b316f
SHA256a8b6f84c5a83b221cb27203a565852745db0010e793aedfe2e98db4cd7f10859
SHA5124280eddeaba17692a542ab11e1ad92cde5aedd0857990bea01dbd967334801318fd5c31519e58af021ff07c7cf37c2cea6c99502d7f7c1b26852cfb935e3a2a1