Analysis
-
max time kernel
22s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 14:35
General
-
Target
awsdw.exe
-
Size
45KB
-
MD5
c256e2fb6c6111d1bbaa46bd2f081be2
-
SHA1
fdbc207fd0dc681e13e68effd8fa9a372bea9052
-
SHA256
56b6c2ebd23727dd8d58648db3114ef88dd1561dd8e92f082b9ad3874cc1d93e
-
SHA512
0ccde1e1c13c764d184b097218282c4b9dfde70c1bb2b1be737f01b46e1f4a824850531f8ab2e9ba99837c9b552f4fbfc53cdda03c09f82dc3c19ee3e321eca9
-
SSDEEP
768:9dhO/poiiUcjlJInlaH9Xqk5nWEZ5SbTDabuI7CPW59:zw+jjgnsH9XqcnW85SbTmuI1
Malware Config
Extracted
xenorat
192.168.100.200
Wiiindowss Deffender
-
delay
5000
-
install_path
appdata
-
port
8848
-
startup_name
Windows Defender
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation awsdw.exe -
Executes dropped EXE 1 IoCs
pid Process 4444 awsdw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1824 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3948 wrote to memory of 4444 3948 awsdw.exe 85 PID 3948 wrote to memory of 4444 3948 awsdw.exe 85 PID 3948 wrote to memory of 4444 3948 awsdw.exe 85 PID 4444 wrote to memory of 1824 4444 awsdw.exe 86 PID 4444 wrote to memory of 1824 4444 awsdw.exe 86 PID 4444 wrote to memory of 1824 4444 awsdw.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\awsdw.exe"C:\Users\Admin\AppData\Local\Temp\awsdw.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Roaming\XenoManager\awsdw.exe"C:\Users\Admin\AppData\Roaming\XenoManager\awsdw.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Defender" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD0EC.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:1824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5f750b35d8d3fb9aab68661a01011728e
SHA1d93b7634473273c4483a89c99d8606af53828d12
SHA256cc3801ba058fedefb6f2a1b9be2caf7eaebb588e1e0d4d623d2aa934c203fa0c
SHA512b442f0ebf7db27d71d890657f587d3026a54d621e44366c471f38ae41afd5e7eacdca54e829b5b5eb720117218e5203e3aa2f3adeb0ed4760c8db2cf38a42f6d
-
Filesize
45KB
MD5c256e2fb6c6111d1bbaa46bd2f081be2
SHA1fdbc207fd0dc681e13e68effd8fa9a372bea9052
SHA25656b6c2ebd23727dd8d58648db3114ef88dd1561dd8e92f082b9ad3874cc1d93e
SHA5120ccde1e1c13c764d184b097218282c4b9dfde70c1bb2b1be737f01b46e1f4a824850531f8ab2e9ba99837c9b552f4fbfc53cdda03c09f82dc3c19ee3e321eca9