Analysis

  • max time kernel
    147s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 21:30

General

  • Target

    16abb3aaa16ae16e61372a09afa047d0N.exe

  • Size

    45KB

  • MD5

    16abb3aaa16ae16e61372a09afa047d0

  • SHA1

    3879b4adaf663ea0cb9e0b188f10a99cb1ef71c6

  • SHA256

    f3444a3a8709d89e5297bead9391bea56c2346f0ea528140319f63eacad04c1b

  • SHA512

    0473b8db9ae508776178e3d797cc0aeb5b32cd4f6cc5c6a817bb8f8e0beda31276d95c9de52dae6a77b073057a796c02af2e71bcc57fb9a788f7064c4a6bf1bf

  • SSDEEP

    768:qWtvB1HEfka3+ZJhH3H8QK/Cw3BVhjFD+1nFZ5SbsDThVbox:zXHEaZv3H8gw37K5SbsxO

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

localhost

Mutex

testing 123123

Attributes
  • delay

    1000

  • install_path

    nothingset

  • port

    1234

  • startup_name

    nothingset

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\16abb3aaa16ae16e61372a09afa047d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\16abb3aaa16ae16e61372a09afa047d0N.exe"
    1⤵
      PID:3020

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3020-0-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

      Filesize

      4KB

    • memory/3020-1-0x00000000008F0000-0x0000000000902000-memory.dmp

      Filesize

      72KB

    • memory/3020-2-0x0000000074D80000-0x000000007546E000-memory.dmp

      Filesize

      6.9MB

    • memory/3020-3-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

      Filesize

      4KB

    • memory/3020-4-0x0000000074D80000-0x000000007546E000-memory.dmp

      Filesize

      6.9MB