Analysis
-
max time kernel
124s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe
Resource
win7-20240704-en
General
-
Target
249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe
-
Size
240KB
-
MD5
cc5b6e9deec470d26e074859ca794aca
-
SHA1
0cf0d409f644c3712299b0c91ea249537d51ff45
-
SHA256
249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99
-
SHA512
bd97b5d8ef82d68dc1d0a2162375a6515b927be95e99dd6a4a725172da885eff4e162d80ad4bbac30b579d6e9fa3d6d73f452716239d61b7c01803afa653959d
-
SSDEEP
6144:suCZay34VffBhW5JDo4mLDiBRnB7/Z8rnA++gQj79toI:JCF0f/O+4m6vkrnA++gQj79T
Malware Config
Extracted
xenorat
91.92.248.167
Dolid_rat_nd8859g
-
delay
60000
-
install_path
appdata
-
port
1280
-
startup_name
dms
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 3056 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 2316 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 2044 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe -
Loads dropped DLL 4 IoCs
pid Process 2440 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1856 set thread context of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 set thread context of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 set thread context of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 2532 set thread context of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 set thread context of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 set thread context of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1224 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe Token: SeDebugPrivilege 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 wrote to memory of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 wrote to memory of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 wrote to memory of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 wrote to memory of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 wrote to memory of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 wrote to memory of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 wrote to memory of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 wrote to memory of 2804 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 31 PID 1856 wrote to memory of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 wrote to memory of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 wrote to memory of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 wrote to memory of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 wrote to memory of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 wrote to memory of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 wrote to memory of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 wrote to memory of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 wrote to memory of 2440 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 32 PID 1856 wrote to memory of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 1856 wrote to memory of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 1856 wrote to memory of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 1856 wrote to memory of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 1856 wrote to memory of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 1856 wrote to memory of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 1856 wrote to memory of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 1856 wrote to memory of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 1856 wrote to memory of 2664 1856 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 33 PID 2440 wrote to memory of 2532 2440 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 34 PID 2440 wrote to memory of 2532 2440 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 34 PID 2440 wrote to memory of 2532 2440 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 34 PID 2440 wrote to memory of 2532 2440 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 34 PID 2532 wrote to memory of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 wrote to memory of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 wrote to memory of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 wrote to memory of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 wrote to memory of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 wrote to memory of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 wrote to memory of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 wrote to memory of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 wrote to memory of 3056 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 35 PID 2532 wrote to memory of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 wrote to memory of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 wrote to memory of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 wrote to memory of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 wrote to memory of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 wrote to memory of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 wrote to memory of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 wrote to memory of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 wrote to memory of 2316 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 36 PID 2532 wrote to memory of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 PID 2532 wrote to memory of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 PID 2532 wrote to memory of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 PID 2532 wrote to memory of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 PID 2532 wrote to memory of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 PID 2532 wrote to memory of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 PID 2532 wrote to memory of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 PID 2532 wrote to memory of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 PID 2532 wrote to memory of 2044 2532 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 37 PID 2664 wrote to memory of 1224 2664 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 38 PID 2664 wrote to memory of 1224 2664 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 38 PID 2664 wrote to memory of 1224 2664 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 38 PID 2664 wrote to memory of 1224 2664 249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe"C:\Users\Admin\AppData\Local\Temp\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exeC:\Users\Admin\AppData\Local\Temp\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe2⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exeC:\Users\Admin\AppData\Local\Temp\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Roaming\XenoManager\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe"C:\Users\Admin\AppData\Roaming\XenoManager\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Roaming\XenoManager\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exeC:\Users\Admin\AppData\Roaming\XenoManager\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe4⤵
- Executes dropped EXE
PID:3056
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exeC:\Users\Admin\AppData\Roaming\XenoManager\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe4⤵
- Executes dropped EXE
PID:2316
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exeC:\Users\Admin\AppData\Roaming\XenoManager\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe4⤵
- Executes dropped EXE
PID:2044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exeC:\Users\Admin\AppData\Local\Temp\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "dms" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD7F8.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:1224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9d3f8abd4e6fd7af3ac8c53b6e1f0f7
SHA15eb5022233698b1d053aadd59435a44fa941b86d
SHA256b9d9e57c2368029684360189348709bccc5b91266ba94da7999cafb2b196321a
SHA512c93d2bb653820c44fb7db8b8da2cae6de9acdf8065cdc8df1cb85a03ac4f2b1a8df44dca777b6c452a63335931dde4231ee44efb2584a27dbbf02c81e1450edf
-
\Users\Admin\AppData\Roaming\XenoManager\249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe
Filesize240KB
MD5cc5b6e9deec470d26e074859ca794aca
SHA10cf0d409f644c3712299b0c91ea249537d51ff45
SHA256249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99
SHA512bd97b5d8ef82d68dc1d0a2162375a6515b927be95e99dd6a4a725172da885eff4e162d80ad4bbac30b579d6e9fa3d6d73f452716239d61b7c01803afa653959d