Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-07-2024 23:03
Behavioral task
behavioral1
Sample
sperma.exe
Resource
win10-20240404-en
General
-
Target
sperma.exe
-
Size
45KB
-
MD5
8c516d55a8cbe8bfc8304835b01a4c8e
-
SHA1
d3560c00f9536885edebf2322fe198074110cdc3
-
SHA256
864c2fef6299628900235abdf8b315a6635a8aaca1ad541b3014e35ede1b6f6c
-
SHA512
bf72bf6cce5791dec43d5818ac77fa5a0654dab9997a8e95a3d189f0643884f9e1cb34ac402ee2303f3aafa384b409905e9d57bca37c97a66dd6cf21144df291
-
SSDEEP
768:pdhO/poiiUcjlJInd3H9Xqk5nWEZ5SbTDa2uI7CPW5D:nw+jjgn5H9XqcnW85SbTLuIb
Malware Config
Extracted
xenorat
91.246.109.242
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-299327586-1226193722-3477828593-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 568 msedge.exe 568 msedge.exe 4204 msedge.exe 4204 msedge.exe 1940 msedge.exe 1940 msedge.exe 4556 identity_helper.exe 4556 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3328 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4204 wrote to memory of 1688 4204 msedge.exe 89 PID 4204 wrote to memory of 1688 4204 msedge.exe 89 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 1436 4204 msedge.exe 90 PID 4204 wrote to memory of 568 4204 msedge.exe 91 PID 4204 wrote to memory of 568 4204 msedge.exe 91 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92 PID 4204 wrote to memory of 952 4204 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\sperma.exe"C:\Users\Admin\AppData\Local\Temp\sperma.exe"1⤵PID:5068
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3328
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fff214d3cb8,0x7fff214d3cc8,0x7fff214d3cd82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1816 /prefetch:22⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2672 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,13333477547906025048,4403905850557819797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b03d35a1e3ffb7a9f63b3f24a32b8e85
SHA1878b3c3c4877e1f132819392c12b7de69e1a500a
SHA256832cc8b01bdcc3a2edda654aed8b35bd35b4b308f2843187157e805c61c90435
SHA512fe947eea87acd7d8052bf802f5e1e0105379f07f84160ac51b7771c9d03ae0822b5d56e2ef09b13f0a16b53071df3001f4fe4f255307096477d3db2c9671ee23
-
Filesize
152B
MD58db5917f9989b14874593acc38addada
SHA1e2f1f19709d00cef4c7b8e1bca9a82855380a888
SHA25669518d96a22b831de7923bc73ef0ce86cd8394befe8e1c20bf4f95285a15cc63
SHA51239a70a4207338e819b5dd8dcb5b2b4edaa136a27d51edadac3f76f7de224c54753173a13a55667129f0310b3bbc9f258da0a5b9a7f8b7be6c3c45b64a04e40a2
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD5e3dd210c488031ed0488a336d1d5ab44
SHA16194811d623fa048521bcb683a90e0c4341e7418
SHA2567b3c94842593c3eeba064b851c91518c635c123fcab4a5ea628236a6aadcf9d8
SHA5125cebe6f07a7e8af3f121fb3ef4de7c907799c4bf2a9db9a61664de9cde3276905b010faa01b232a21d1b55e4b05e154cf2c36ae06a0790edba8ea2952ed40192
-
Filesize
5KB
MD5865eb1c993699002acaadc95f6a9af50
SHA19a48e67a2861996a9829c61205c5d5a3c0b9ebd1
SHA25688d233ef274f7c39c30a035040765861d5987d76fd63a84eba0c6952c7d1515f
SHA5123603c1046879b0cb1b72c790c0376564d4baaa42f1c45ae04818ac5b48719452de7192efa697bfe72473807c56f46289cc714926da0d69935ea8f451ae2413d8
-
Filesize
6KB
MD52472a1462972013ea35bd2b4bf4b3232
SHA1de795cc241d0fdd2b01ea6aa52476f363d3672b1
SHA256584dd56d8f611e6e5f54fee423d275a09271e96c9e8a4514695c626ee7ee33d2
SHA5120a5e8ded79a1e216db488b95471d4ed05420dc876c6882c9f1268b27dfeb1ffd19be8e5cc890820889f123cbf9f5ac5fbebec311887bcfb5e7edcb8e2d428610
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f97f6a2a654935d486f062c9e8a7e584
SHA1521323344af022857f4c28c93913d56f72505c60
SHA256a4042925e4b279f41fb2040a4d7d0770d541167d858cef61f4f30ad66a07ec26
SHA5121df44c244c4dc997911158d387e1d8cc7604cf35e556472d382cb5291ed9495c680334c8674b585af832542441ab9934f678a84020e156905699db1ee1fa5d9f
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize11KB
MD5c8ad6ed1c626d9bc77599df90cbe736d
SHA1f76fa771bd2bf3eb468cb9b313b07b73ba7d9d25
SHA2561a1fa61bb952911fc408ade0130aad9f04228b0e2b7d93fb1f7ff9403f621336
SHA512c23a78878945617694684c37b1bee4866b5b916e558f84f1b26dcee949957656de246933c4cf4f29b1227a1619d56202462dee4d9886fe1dcd2180541c877a17