Analysis
-
max time kernel
109s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
a2944e9f2cc19557586d8b3971418c10N.exe
Resource
win7-20240704-en
General
-
Target
a2944e9f2cc19557586d8b3971418c10N.exe
-
Size
444KB
-
MD5
a2944e9f2cc19557586d8b3971418c10
-
SHA1
15184f8309927af19079c2cd91afd2df2188d750
-
SHA256
2c85025f7dfc82cfc31b57213ee4f3c54e66e9806801ce11d070ab64f269778f
-
SHA512
393e9e74344ca43485bef6d9562c7a641549bafc3a48f646d4e9c0e85f7ed03808f1469a376d919b79e7722ebd6322db0de99732e4486dab0906a7232b5f2b79
-
SSDEEP
12288:vEjB1lxxsFutgrCAPAMJPEcXKHffwWdbNnOL:KB1lxaFut6
Malware Config
Extracted
xenorat
91.92.248.167
Dolid_rat_nd8859g
-
delay
60000
-
install_path
appdata
-
port
1293
-
startup_name
kvr
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2360 a2944e9f2cc19557586d8b3971418c10N.exe 2964 a2944e9f2cc19557586d8b3971418c10N.exe 556 a2944e9f2cc19557586d8b3971418c10N.exe 2468 a2944e9f2cc19557586d8b3971418c10N.exe 2072 a2944e9f2cc19557586d8b3971418c10N.exe -
Loads dropped DLL 5 IoCs
pid Process 2364 a2944e9f2cc19557586d8b3971418c10N.exe 2360 a2944e9f2cc19557586d8b3971418c10N.exe 2360 a2944e9f2cc19557586d8b3971418c10N.exe 2360 a2944e9f2cc19557586d8b3971418c10N.exe 2360 a2944e9f2cc19557586d8b3971418c10N.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2752 set thread context of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 set thread context of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 set thread context of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 set thread context of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2360 set thread context of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 set thread context of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 set thread context of 2468 2360 a2944e9f2cc19557586d8b3971418c10N.exe 37 PID 2360 set thread context of 2072 2360 a2944e9f2cc19557586d8b3971418c10N.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2088 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2752 a2944e9f2cc19557586d8b3971418c10N.exe Token: SeDebugPrivilege 2360 a2944e9f2cc19557586d8b3971418c10N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 wrote to memory of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 wrote to memory of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 wrote to memory of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 wrote to memory of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 wrote to memory of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 wrote to memory of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 wrote to memory of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 wrote to memory of 2824 2752 a2944e9f2cc19557586d8b3971418c10N.exe 30 PID 2752 wrote to memory of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 wrote to memory of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 wrote to memory of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 wrote to memory of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 wrote to memory of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 wrote to memory of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 wrote to memory of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 wrote to memory of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 wrote to memory of 2364 2752 a2944e9f2cc19557586d8b3971418c10N.exe 31 PID 2752 wrote to memory of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 wrote to memory of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 wrote to memory of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 wrote to memory of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 wrote to memory of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 wrote to memory of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 wrote to memory of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 wrote to memory of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 wrote to memory of 2756 2752 a2944e9f2cc19557586d8b3971418c10N.exe 32 PID 2752 wrote to memory of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2752 wrote to memory of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2752 wrote to memory of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2752 wrote to memory of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2752 wrote to memory of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2752 wrote to memory of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2752 wrote to memory of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2752 wrote to memory of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2752 wrote to memory of 2988 2752 a2944e9f2cc19557586d8b3971418c10N.exe 33 PID 2364 wrote to memory of 2360 2364 a2944e9f2cc19557586d8b3971418c10N.exe 34 PID 2364 wrote to memory of 2360 2364 a2944e9f2cc19557586d8b3971418c10N.exe 34 PID 2364 wrote to memory of 2360 2364 a2944e9f2cc19557586d8b3971418c10N.exe 34 PID 2364 wrote to memory of 2360 2364 a2944e9f2cc19557586d8b3971418c10N.exe 34 PID 2360 wrote to memory of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 wrote to memory of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 wrote to memory of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 wrote to memory of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 wrote to memory of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 wrote to memory of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 wrote to memory of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 wrote to memory of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 wrote to memory of 2964 2360 a2944e9f2cc19557586d8b3971418c10N.exe 35 PID 2360 wrote to memory of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 wrote to memory of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 wrote to memory of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 wrote to memory of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 wrote to memory of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 wrote to memory of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 wrote to memory of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 wrote to memory of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 wrote to memory of 556 2360 a2944e9f2cc19557586d8b3971418c10N.exe 36 PID 2360 wrote to memory of 2468 2360 a2944e9f2cc19557586d8b3971418c10N.exe 37 PID 2360 wrote to memory of 2468 2360 a2944e9f2cc19557586d8b3971418c10N.exe 37 PID 2360 wrote to memory of 2468 2360 a2944e9f2cc19557586d8b3971418c10N.exe 37 PID 2360 wrote to memory of 2468 2360 a2944e9f2cc19557586d8b3971418c10N.exe 37 PID 2360 wrote to memory of 2468 2360 a2944e9f2cc19557586d8b3971418c10N.exe 37 PID 2360 wrote to memory of 2468 2360 a2944e9f2cc19557586d8b3971418c10N.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exe"C:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exeC:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exe2⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exeC:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exe"C:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exeC:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exe4⤵
- Executes dropped EXE
PID:2964
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exeC:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exe4⤵
- Executes dropped EXE
PID:556
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exeC:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exe4⤵
- Executes dropped EXE
PID:2468
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exeC:\Users\Admin\AppData\Roaming\XenoManager\a2944e9f2cc19557586d8b3971418c10N.exe4⤵
- Executes dropped EXE
PID:2072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exeC:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exe2⤵PID:2756
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "kvr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp56D7.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exeC:\Users\Admin\AppData\Local\Temp\a2944e9f2cc19557586d8b3971418c10N.exe2⤵PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50f962022356a4d29252f1c5b729315f6
SHA1b263cd40f85fd0e56fc053d4536eb2f15e2b3b0c
SHA256b969a000153bcf0c205d45b8ec00ed9e6d4ab194a98dc5a08e2e39af391d4373
SHA512153e88ac4a34605430a2ef7cf43d9e8e1f8864e66ac349f1f23b1ae09591d27ff5063f47c0e303bf245af612798ecc5ebb20ee9bbf4453ae445ae133f4253dcb
-
Filesize
444KB
MD5a2944e9f2cc19557586d8b3971418c10
SHA115184f8309927af19079c2cd91afd2df2188d750
SHA2562c85025f7dfc82cfc31b57213ee4f3c54e66e9806801ce11d070ab64f269778f
SHA512393e9e74344ca43485bef6d9562c7a641549bafc3a48f646d4e9c0e85f7ed03808f1469a376d919b79e7722ebd6322db0de99732e4486dab0906a7232b5f2b79