Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 14:36
General
-
Target
WDSADW.exe
-
Size
45KB
-
MD5
5e435ffa70fc96fd6a76c44d81e28f61
-
SHA1
0fc858abe6ed67c699ecee46e87f135ecbe23ea8
-
SHA256
a12536e4dda988a7c6270bf8d83756d691f4f8b89d1665642e74d3e3535262c9
-
SHA512
6b17049768e8949c4d9f8a942d248cff6c6851a9e48c46860c0400f47dd46ea6f5874ae1f9bb1c879786a78638b4347a72c6ced3c73bf391bb7392eda1c157c2
-
SSDEEP
768:2dhO/poiiUcjlJIn7a3H9Xqk5nWEZ5SbTDaTuI7CPW5h:gw+jjgnUH9XqcnW85SbTuuIZ
Malware Config
Extracted
xenorat
performance-ha.gl.at.ply.gg:33365
Wiiindowss Deffender
-
delay
5000
-
install_path
appdata
-
port
2137
-
startup_name
Windows Defender
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation WDSADW.exe -
Executes dropped EXE 1 IoCs
pid Process 2472 WDSADW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2432 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3668 wrote to memory of 2472 3668 WDSADW.exe 85 PID 3668 wrote to memory of 2472 3668 WDSADW.exe 85 PID 3668 wrote to memory of 2472 3668 WDSADW.exe 85 PID 2472 wrote to memory of 2432 2472 WDSADW.exe 87 PID 2472 wrote to memory of 2432 2472 WDSADW.exe 87 PID 2472 wrote to memory of 2432 2472 WDSADW.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\WDSADW.exe"C:\Users\Admin\AppData\Local\Temp\WDSADW.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Roaming\XenoManager\WDSADW.exe"C:\Users\Admin\AppData\Roaming\XenoManager\WDSADW.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Defender" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB1AC.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5e9745b21bffb2a54b356e067f8ce086e
SHA1492afd2a263f3a476171ed12a3681eb267d6e64b
SHA2564e847f7efd31f3ed0e1e41657f050a047de885880d6b47bc117425ef79fd4a92
SHA512fe17bc047bd881a3211d0dd7be45a12227c685df2e90fdd5744d991916b1ba5625e70e8f660e8dbba5dbeb2916b92b20707774414e67c0b249f4b04ba8ff25a6
-
Filesize
45KB
MD55e435ffa70fc96fd6a76c44d81e28f61
SHA10fc858abe6ed67c699ecee46e87f135ecbe23ea8
SHA256a12536e4dda988a7c6270bf8d83756d691f4f8b89d1665642e74d3e3535262c9
SHA5126b17049768e8949c4d9f8a942d248cff6c6851a9e48c46860c0400f47dd46ea6f5874ae1f9bb1c879786a78638b4347a72c6ced3c73bf391bb7392eda1c157c2