Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 21:30

General

  • Target

    16abb3aaa16ae16e61372a09afa047d0N.exe

  • Size

    45KB

  • MD5

    16abb3aaa16ae16e61372a09afa047d0

  • SHA1

    3879b4adaf663ea0cb9e0b188f10a99cb1ef71c6

  • SHA256

    f3444a3a8709d89e5297bead9391bea56c2346f0ea528140319f63eacad04c1b

  • SHA512

    0473b8db9ae508776178e3d797cc0aeb5b32cd4f6cc5c6a817bb8f8e0beda31276d95c9de52dae6a77b073057a796c02af2e71bcc57fb9a788f7064c4a6bf1bf

  • SSDEEP

    768:qWtvB1HEfka3+ZJhH3H8QK/Cw3BVhjFD+1nFZ5SbsDThVbox:zXHEaZv3H8gw37K5SbsxO

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

localhost

Mutex

testing 123123

Attributes
  • delay

    1000

  • install_path

    nothingset

  • port

    1234

  • startup_name

    nothingset

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\16abb3aaa16ae16e61372a09afa047d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\16abb3aaa16ae16e61372a09afa047d0N.exe"
    1⤵
      PID:3524

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3524-0-0x000000007499E000-0x000000007499F000-memory.dmp

      Filesize

      4KB

    • memory/3524-1-0x00000000000C0000-0x00000000000D2000-memory.dmp

      Filesize

      72KB

    • memory/3524-2-0x0000000074990000-0x0000000075140000-memory.dmp

      Filesize

      7.7MB

    • memory/3524-3-0x000000007499E000-0x000000007499F000-memory.dmp

      Filesize

      4KB

    • memory/3524-4-0x0000000074990000-0x0000000075140000-memory.dmp

      Filesize

      7.7MB