Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 20:28

General

  • Target

    Radium/RadiumExecutor.exe

  • Size

    12.6MB

  • MD5

    7a17d34bac23e365863ea1da1e42e968

  • SHA1

    b5ccab413899349d2821cc2798bce29f0118121f

  • SHA256

    571a330dfb82f72878d9ede8bdfc332544446a0160117bf37399c3b9ca0775e2

  • SHA512

    c021f26320c49c64831c676820d1bc7cb84ba3f49b798d4f858461eebc398a37d937de1d4cf214b973b8ac1cb693830894c4ae9b1bc7d62f2fd5d56b7d5ba4ac

  • SSDEEP

    196608:MRvSjNRyzz9V4EAWzcNtYuZuT0ItZ/jBpOtwDc3rSlou2it3NaB+He+8:MRqjj+xV8acwWuNtZ/jetwc3SYihNqc

Malware Config

Extracted

Family

xenorat

C2

jctestwindows.airdns.org

Mutex

Xeno_rat_nd8913d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    45010

  • startup_name

    WindowsErrorHandler

Extracted

Family

growtopia

C2

https://discord.com/api/webhooks/1199763266872803338/8vedcXoMcyExhe1xhBm5f8ncmafWmOB3pkulE0l8g9Pel0t3ziyr2V51cLTVEjYsE4Rj

Signatures

  • Growtopia

    Growtopa is an opensource modular stealer written in C#.

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Radium\RadiumExecutor.exe
    "C:\Users\Admin\AppData\Local\Temp\Radium\RadiumExecutor.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAawB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAdwBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAbQBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGEAagB0ACMAPgA="
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:988
    • C:\Users\Admin\AppData\Local\Temp\Ilkdt.exe
      "C:\Users\Admin\AppData\Local\Temp\Ilkdt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2728
    • C:\Users\Admin\AppData\Local\Temp\WinHostMgr.exe
      "C:\Users\Admin\AppData\Local\Temp\WinHostMgr.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2912
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1648
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          4⤵
          • Drops file in Windows directory
          PID:1932
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop UsoSvc
        3⤵
        • Launches sc.exe
        PID:1368
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop WaaSMedicSvc
        3⤵
        • Launches sc.exe
        PID:1360
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop wuauserv
        3⤵
        • Launches sc.exe
        PID:1512
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop bits
        3⤵
        • Launches sc.exe
        PID:1036
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop dosvc
        3⤵
        • Launches sc.exe
        PID:2992
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1540
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1480
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1868
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "GMDTJRUT"
        3⤵
        • Launches sc.exe
        PID:700
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "GMDTJRUT" binpath= "C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe" start= "auto"
        3⤵
        • Launches sc.exe
        PID:2152
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        3⤵
        • Launches sc.exe
        PID:2704
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "GMDTJRUT"
        3⤵
        • Launches sc.exe
        PID:2300
    • C:\Users\Admin\AppData\Local\Temp\WinErrorMgr.exe
      "C:\Users\Admin\AppData\Local\Temp\WinErrorMgr.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Users\Admin\AppData\Local\Temp\XenoManager\WinErrorMgr.exe
        "C:\Users\Admin\AppData\Local\Temp\XenoManager\WinErrorMgr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2936
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /Create /TN "WindowsErrorHandler" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4C9A.tmp" /F
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:8184
    • C:\Users\Admin\AppData\Roaming\KeyGeneratorI.exe
      "C:\Users\Admin\AppData\Roaming\KeyGeneratorI.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Roaming\KeyGeneratorI.exe
        "C:\Users\Admin\AppData\Roaming\KeyGeneratorI.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1108
    • C:\Users\Admin\AppData\Local\Temp\Sahyui1337.exe
      "C:\Users\Admin\AppData\Local\Temp\Sahyui1337.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2356
  • C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe
    C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2724
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\system32\wusa.exe
        wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Drops file in Windows directory
        PID:3120
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop UsoSvc
      2⤵
      • Launches sc.exe
      PID:1136
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop WaaSMedicSvc
      2⤵
      • Launches sc.exe
      PID:3152
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop wuauserv
      2⤵
      • Launches sc.exe
      PID:3236
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop bits
      2⤵
      • Launches sc.exe
      PID:3324
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop dosvc
      2⤵
      • Launches sc.exe
      PID:3380
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:3440
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:3460
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:3476
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:3492
    • C:\Windows\system32\conhost.exe
      C:\Windows\system32\conhost.exe
      2⤵
        PID:3544
      • C:\Windows\explorer.exe
        explorer.exe
        2⤵
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Ilkdt.exe

      Filesize

      191KB

      MD5

      e004a568b841c74855f1a8a5d43096c7

      SHA1

      b90fd74593ae9b5a48cb165b6d7602507e1aeca4

      SHA256

      d49013d6be0f0e727c0b53bce1d3fed00656c7a2836ceef0a9d4cb816a5878db

      SHA512

      402dd4d4c57fb6f5c7a531b7210a897dfe41d68df99ae4d605944f6e5b2cecaafa3fe27562fe45e7e216a7c9e29e63139d4382310b41f04a35ad56115fbed2af

    • C:\Users\Admin\AppData\Local\Temp\_MEI27602\python312.dll

      Filesize

      6.7MB

      MD5

      48ebfefa21b480a9b0dbfc3364e1d066

      SHA1

      b44a3a9b8c585b30897ddc2e4249dfcfd07b700a

      SHA256

      0cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2

      SHA512

      4e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce

    • C:\Users\Admin\AppData\Local\Temp\tmp4C9A.tmp

      Filesize

      1KB

      MD5

      7f673f709ab0e7278e38f0fd8e745cd4

      SHA1

      ac504108a274b7051e3b477bcd51c9d1a4a01c2c

      SHA256

      da5ab3278aaa04fbd51272a617aef9b903ca53c358fac48fc0f558e257e063a4

      SHA512

      e932ccbd9d3ec6ee129f0dab82710904b84e657532c5b623d3c7b3b4ce45732caf8ff5d7b39095cf99ecf97d4e40dd9d755eb2b89c8ede629b287c29e41d1132

    • C:\Users\Admin\AppData\Roaming\KeyGeneratorI.exe

      Filesize

      6.9MB

      MD5

      d1ebfb3ff83375dc6897e50a95e8b2a5

      SHA1

      fd1cb7ac0181ee647419761871dd78ad0a09d44a

      SHA256

      ec709b3a8a2d6df0c990303226ef5d8fea4d4270add2d06e69b0db8b913fcd06

      SHA512

      f210610472f34ff991a93bf290deb7d76e38b11d534b21ac689f53432e018e12792d801d38afbfd722fdaea21f4cad47ca5a09b2f7c983d73cec57e01a9d5d63

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0K8VOQ1PC422YSHCG33H.temp

      Filesize

      7KB

      MD5

      cec93683606ac3d04ffbe1208d189645

      SHA1

      832c45e7bcf10204b845102ee2ee0272320a229b

      SHA256

      b06c5d7e42725dba36efe0cf75e6be9707f0aca9e9a7ac9e7b01792afaecb9f7

      SHA512

      3635bf9fbc7523698c57719b4a33f3b1c403c3ea20495d8766caa978140a38049f901cfc2e488890ef5bc042a42d68f01a96809ab72a6faab263bf9a81fffaf4

    • \Users\Admin\AppData\Local\Temp\Sahyui1337.exe

      Filesize

      316KB

      MD5

      675d9e9ab252981f2f919cf914d9681d

      SHA1

      7485f5c9da283475136df7fa8b62756efbb5dd17

      SHA256

      0f055835332ef8e368185ae461e7c9eacdeb3d600ea550d605b09a20e0856e2d

      SHA512

      9dd936705fd43ebe8be17fcf77173eaaf16046f5880f8fe48fc68ded91ef6202ba65c605980bd2e330d2c7f463f772750a1bd96246fffdc9cb6bf8e1b00a2ccb

    • \Users\Admin\AppData\Local\Temp\WinErrorMgr.exe

      Filesize

      42KB

      MD5

      d499e979a50c958f1a67f0e2a28af43d

      SHA1

      1e5fa0824554c31f19ce01a51edb9bed86f67cf0

      SHA256

      bc3d545c541e42420ce2c2eabc7e5afab32c869a1adb20adb11735957d0d0b0e

      SHA512

      668047f178d82bebefeb8c2e7731d34ff24dc755dacd3362b43d8b44c6b148fc51af0d0ab2d0a67f0344ab6158b883fe568e4eeb0e34152108735574f0e1e763

    • \Users\Admin\AppData\Local\Temp\WinHostMgr.exe

      Filesize

      5.0MB

      MD5

      e222309197c5e633aa8e294ba4bdcd29

      SHA1

      52b3f89a3d2262bf603628093f6d1e71d9cc3820

      SHA256

      047a7ca1b8848c1c0e3c0fcc6ece056390760b24580f27f6966b86b0c2a1042b

      SHA512

      9eb37686e0cee9ec18d12a4edd37c8334d26650c74eae5b30231c2b0db1628d52848123c9348c3da306ec950b827ec0a56cdf43ee325a9e280022c68193d8503

    • memory/1648-1671-0x0000000001F10000-0x0000000001F18000-memory.dmp

      Filesize

      32KB

    • memory/1648-1670-0x000000001B4E0000-0x000000001B7C2000-memory.dmp

      Filesize

      2.9MB

    • memory/2356-46-0x0000000000E80000-0x0000000000ED4000-memory.dmp

      Filesize

      336KB

    • memory/2724-1679-0x0000000000CF0000-0x0000000000CF8000-memory.dmp

      Filesize

      32KB

    • memory/2724-1678-0x0000000019F70000-0x000000001A252000-memory.dmp

      Filesize

      2.9MB

    • memory/2728-109-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-89-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-126-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-123-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-121-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-119-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-117-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-115-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-113-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-111-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-63-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-107-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-103-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-102-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-99-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-98-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-95-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-93-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-91-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-62-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-87-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-85-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-83-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-81-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-79-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-105-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-77-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-75-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-73-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-65-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-67-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-69-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-36-0x0000000000A60000-0x0000000000A96000-memory.dmp

      Filesize

      216KB

    • memory/2728-71-0x0000000001F20000-0x0000000001F85000-memory.dmp

      Filesize

      404KB

    • memory/2728-58-0x0000000001F20000-0x0000000001F8C000-memory.dmp

      Filesize

      432KB

    • memory/2732-35-0x0000000001280000-0x0000000001290000-memory.dmp

      Filesize

      64KB

    • memory/2936-61-0x00000000009F0000-0x0000000000A00000-memory.dmp

      Filesize

      64KB