Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 14:40
General
-
Target
Pornosy z matejkiem.exe
-
Size
45KB
-
MD5
29dbc7b31dbf7dcb4289d07be9da47f2
-
SHA1
03ab7ceda224b198edafb070140b6421df8c37d3
-
SHA256
215751b1b39deb885cefda6cdb03691226177a692e3404193c6ea8ecd3ea98f1
-
SHA512
026ad8ad03619ad34b3f6796889581ec7d24387a1f1d2d671ad0106fd942ae8d6a3cdf34e3d374ccfa3aa3289d4467975c7e386483bba95a18f9ebaf1a7836d0
-
SSDEEP
768:9dhO/poiiUcjlJInwwH9Xqk5nWEZ5SbTDaUWI7CPW59:zw+jjgnZH9XqcnW85SbTNWI1
Malware Config
Extracted
xenorat
147.185.221.19
Wiiindowss Deffender
-
delay
5000
-
install_path
appdata
-
port
33365
-
startup_name
Windows Defender
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Pornosy z matejkiem.exe Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation Pornosy z matejkiem.exe -
Executes dropped EXE 1 IoCs
pid Process 3988 Pornosy z matejkiem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe 3988 Pornosy z matejkiem.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3988 Pornosy z matejkiem.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3988 2356 Pornosy z matejkiem.exe 85 PID 2356 wrote to memory of 3988 2356 Pornosy z matejkiem.exe 85 PID 2356 wrote to memory of 3988 2356 Pornosy z matejkiem.exe 85 PID 3988 wrote to memory of 4104 3988 Pornosy z matejkiem.exe 87 PID 3988 wrote to memory of 4104 3988 Pornosy z matejkiem.exe 87 PID 3988 wrote to memory of 4104 3988 Pornosy z matejkiem.exe 87 PID 3988 wrote to memory of 1180 3988 Pornosy z matejkiem.exe 92 PID 3988 wrote to memory of 1180 3988 Pornosy z matejkiem.exe 92 PID 3988 wrote to memory of 1180 3988 Pornosy z matejkiem.exe 92 PID 3988 wrote to memory of 1608 3988 Pornosy z matejkiem.exe 94 PID 3988 wrote to memory of 1608 3988 Pornosy z matejkiem.exe 94 PID 3988 wrote to memory of 1608 3988 Pornosy z matejkiem.exe 94 PID 3988 wrote to memory of 2564 3988 Pornosy z matejkiem.exe 96 PID 3988 wrote to memory of 2564 3988 Pornosy z matejkiem.exe 96 PID 3988 wrote to memory of 2564 3988 Pornosy z matejkiem.exe 96 PID 2564 wrote to memory of 3076 2564 cmd.exe 98 PID 2564 wrote to memory of 3076 2564 cmd.exe 98 PID 2564 wrote to memory of 3076 2564 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pornosy z matejkiem.exe"C:\Users\Admin\AppData\Local\Temp\Pornosy z matejkiem.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\XenoManager\Pornosy z matejkiem.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Pornosy z matejkiem.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Defender" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBD16.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:4104
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query /v /fo csv3⤵PID:1180
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /delete /tn "\Windows Defender" /f3⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Roaming\XenoManager\Pornosy z matejkiem.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:3076
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD51245b94f259c52066a8c537a88643660
SHA18b9c39dac7427499ca4ef6dbd79db9a0e350c1cb
SHA256e9254da4f4435aad4d58bfd26e081c0d1df28c82d17b479d06159baee7cedf8c
SHA5123b4e3fa49917b5b30d62fd85dcce543de2c1a69653fb05bbc65979f0afd6bfa8bf0524c666d104f56612c502f3efb1eec895d4ba0f4686f6d7546793d43f9af0
-
Filesize
45KB
MD529dbc7b31dbf7dcb4289d07be9da47f2
SHA103ab7ceda224b198edafb070140b6421df8c37d3
SHA256215751b1b39deb885cefda6cdb03691226177a692e3404193c6ea8ecd3ea98f1
SHA512026ad8ad03619ad34b3f6796889581ec7d24387a1f1d2d671ad0106fd942ae8d6a3cdf34e3d374ccfa3aa3289d4467975c7e386483bba95a18f9ebaf1a7836d0