Analysis
-
max time kernel
41s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 18:16
Behavioral task
behavioral1
Sample
231414214.exe
Resource
win7-20240705-en
General
-
Target
231414214.exe
-
Size
46KB
-
MD5
2d4f8f0121e08ee51e3d13ba676029d2
-
SHA1
b415375c857ad193c48d814d002ddf8f69f56f6a
-
SHA256
ec87515958ea0e140ac984e1dd2e80d51b0124548cfc0182f0329e195f3cef99
-
SHA512
d5844ca8aedea685b83e8f01ebd603bc41e9cd50b8c5dc917ca6e6e6c8cacb59df258dfbf96a7e9e9d4733261c6df2801de7f716e5c37e7471368c353526b700
-
SSDEEP
768:0dhO/poiiUcjlJInGr6BH9Xqk5nWEZ5SbTDawuI7CPW5j:Ow+jjgnrH9XqcnW85SbTNuIb
Malware Config
Extracted
xenorat
192.168.1.254
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Windows Defender
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 604 231414214.exe -
Loads dropped DLL 1 IoCs
pid Process 2072 231414214.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 604 2072 231414214.exe 29 PID 2072 wrote to memory of 604 2072 231414214.exe 29 PID 2072 wrote to memory of 604 2072 231414214.exe 29 PID 2072 wrote to memory of 604 2072 231414214.exe 29 PID 604 wrote to memory of 2868 604 231414214.exe 30 PID 604 wrote to memory of 2868 604 231414214.exe 30 PID 604 wrote to memory of 2868 604 231414214.exe 30 PID 604 wrote to memory of 2868 604 231414214.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\231414214.exe"C:\Users\Admin\AppData\Local\Temp\231414214.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\XenoManager\231414214.exe"C:\Users\Admin\AppData\Roaming\XenoManager\231414214.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Defender" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFAA4.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD599048d19530f4bcb5845d72847a4d3a2
SHA147e92a5b7cfb41787fba36596760e10310cdea29
SHA256a89808aac8ab191e47823b3f3a3be3327286dd395fbd40487bb41bd630098761
SHA5125f710dbe079f01407ec571e895dfa84855c1759ebed32195c6d76bf47cc02f99a7ee84262d6d216beda50e1710c448172750e53c8a694791bfc87e9c489e49db
-
Filesize
46KB
MD52d4f8f0121e08ee51e3d13ba676029d2
SHA1b415375c857ad193c48d814d002ddf8f69f56f6a
SHA256ec87515958ea0e140ac984e1dd2e80d51b0124548cfc0182f0329e195f3cef99
SHA512d5844ca8aedea685b83e8f01ebd603bc41e9cd50b8c5dc917ca6e6e6c8cacb59df258dfbf96a7e9e9d4733261c6df2801de7f716e5c37e7471368c353526b700