Analysis
-
max time kernel
1783s -
max time network
1804s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
07-07-2024 13:05
General
-
Target
pegasus.exe
-
Size
45KB
-
MD5
f9a1750cd762fa4fb79b79161b0427ea
-
SHA1
59aad082ead63005a62d0401649420768227c049
-
SHA256
53b919493ccf56d390b44b53fa6b28d723bc0483790914792f100827798afdd0
-
SHA512
f712cf63c5d747158f9829bc036fd2c06bb51dc211b1b9473a9df843b0d2c35ae3e849908cdeed9b7b23e66e33bfffeb34b0c73688daca211787c3b07a79377d
-
SSDEEP
768:ldhO/poiiUcjlJIn4hYH9Xqk5nWEZ5SbTDaxuI7CPW5p:7w+jjgn4SH9XqcnW85SbTsuIx
Malware Config
Extracted
xenorat
192.168.0.48
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
JavaUpdater
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 864 pegasus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 200 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5028 wrote to memory of 864 5028 pegasus.exe 72 PID 5028 wrote to memory of 864 5028 pegasus.exe 72 PID 5028 wrote to memory of 864 5028 pegasus.exe 72 PID 864 wrote to memory of 200 864 pegasus.exe 73 PID 864 wrote to memory of 200 864 pegasus.exe 73 PID 864 wrote to memory of 200 864 pegasus.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\pegasus.exe"C:\Users\Admin\AppData\Local\Temp\pegasus.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Roaming\XenoManager\pegasus.exe"C:\Users\Admin\AppData\Roaming\XenoManager\pegasus.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "JavaUpdater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5E33.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52130e8679b94e51b8f2b5f693605a59e
SHA1e088d5d0da43302043ff774d0af0d2a1a5144527
SHA256153d87e6590c23a16a2f3b62568cf40321ec016daa88bcab57f8a24e0fb2a0dd
SHA512aa985852accc59fadcdce709fab999ee12544e1abdbcf960faff9a78fd4842615b4a2d406bb88d7874013daeba3659b9f6f4789e1a3063728d7b8e55e51b3c2d
-
Filesize
45KB
MD5f9a1750cd762fa4fb79b79161b0427ea
SHA159aad082ead63005a62d0401649420768227c049
SHA25653b919493ccf56d390b44b53fa6b28d723bc0483790914792f100827798afdd0
SHA512f712cf63c5d747158f9829bc036fd2c06bb51dc211b1b9473a9df843b0d2c35ae3e849908cdeed9b7b23e66e33bfffeb34b0c73688daca211787c3b07a79377d