Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 17:04
Behavioral task
behavioral1
Sample
BEForcer.exe
Resource
win7-20240221-en
General
-
Target
BEForcer.exe
-
Size
45KB
-
MD5
888405f1ed21b89ac08343458251bf26
-
SHA1
4c9b54da2336376441af26ed4bedcd6fda1b316f
-
SHA256
a8b6f84c5a83b221cb27203a565852745db0010e793aedfe2e98db4cd7f10859
-
SHA512
4280eddeaba17692a542ab11e1ad92cde5aedd0857990bea01dbd967334801318fd5c31519e58af021ff07c7cf37c2cea6c99502d7f7c1b26852cfb935e3a2a1
-
SSDEEP
768:1dhO/poiiUcjlJInYqH9Xqk5nWEZ5SbTDa3WI7CPW5R:Lw+jjgnzH9XqcnW85SbTGWI5
Malware Config
Extracted
xenorat
23.243.100.240
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Windows Security
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation BEForcer.exe -
Executes dropped EXE 1 IoCs
pid Process 3316 BEForcer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1108 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3756 wrote to memory of 3316 3756 BEForcer.exe 88 PID 3756 wrote to memory of 3316 3756 BEForcer.exe 88 PID 3756 wrote to memory of 3316 3756 BEForcer.exe 88 PID 3316 wrote to memory of 1108 3316 BEForcer.exe 90 PID 3316 wrote to memory of 1108 3316 BEForcer.exe 90 PID 3316 wrote to memory of 1108 3316 BEForcer.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\BEForcer.exe"C:\Users\Admin\AppData\Local\Temp\BEForcer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Roaming\XenoManager\BEForcer.exe"C:\Users\Admin\AppData\Roaming\XenoManager\BEForcer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Security" /XML "C:\Users\Admin\AppData\Local\Temp\tmp48F.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:1108
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:81⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5f78d2f389b8f658fde9e7f33dee66c15
SHA1d222b225e0d734b93a2b04e4fdbaf4910ed4e69d
SHA256f1bef8ec4cd223f9278b0f54af5579aa335966ac6d0588f27aa9b8f3d3d6d786
SHA512b31f9e7c1ef8ae4bf0eb61fdad582908aadd35367855e71cb9f0c1e957dd4c7276262b6f483cd16836aa0ff7897f34de4b6039daa41a8a183ae0ea2a156c275c
-
Filesize
45KB
MD5888405f1ed21b89ac08343458251bf26
SHA14c9b54da2336376441af26ed4bedcd6fda1b316f
SHA256a8b6f84c5a83b221cb27203a565852745db0010e793aedfe2e98db4cd7f10859
SHA5124280eddeaba17692a542ab11e1ad92cde5aedd0857990bea01dbd967334801318fd5c31519e58af021ff07c7cf37c2cea6c99502d7f7c1b26852cfb935e3a2a1