Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
Betaling.exe
Resource
win7-20240708-en
General
-
Target
Betaling.exe
-
Size
707KB
-
MD5
76e42ae7f8be751dc2802f8429acad56
-
SHA1
60b373bcd072ff1f31cb32abcb9f26387cfacb9e
-
SHA256
1bca88ef695a571b209d53645981a5bf0d005491ee35b4bf7fb5890c4f7fb8d5
-
SHA512
ba3d1850d8bbd052170c89783c57ed6130cdc02592f3c795a0d3de5efffeec6726f88eaf25b18716b4b44db908407fef1e84199586604ed2db51fb1d9528bea7
-
SSDEEP
12288:WcrNS33L10QdrX2nVnRe87C67I1LX/OrJ3yfc5UsrJZTUfe5xZ:FNA3R5drXyVReq+7aCfNgJ5F7Z
Malware Config
Extracted
xenorat
91.92.248.167
Bolid_rat_nd8859g
-
delay
60500
-
install_path
appdata
-
port
1294
-
startup_name
bel
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation Betaling.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation gfdhxdh.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation gfdhxdh.exe -
Executes dropped EXE 11 IoCs
pid Process 5072 gfdhxdh.sfx.exe 2192 gfdhxdh.exe 2296 gfdhxdh.exe 3236 gfdhxdh.exe 3076 gfdhxdh.exe 4344 gfdhxdh.exe 2672 gfdhxdh.exe 4424 gfdhxdh.exe 4184 gfdhxdh.exe 4504 gfdhxdh.exe 1964 gfdhxdh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2192 set thread context of 2296 2192 gfdhxdh.exe 91 PID 2192 set thread context of 3236 2192 gfdhxdh.exe 92 PID 2192 set thread context of 3076 2192 gfdhxdh.exe 94 PID 2192 set thread context of 4344 2192 gfdhxdh.exe 95 PID 2672 set thread context of 4424 2672 gfdhxdh.exe 99 PID 2672 set thread context of 4184 2672 gfdhxdh.exe 100 PID 2672 set thread context of 4504 2672 gfdhxdh.exe 102 PID 2672 set thread context of 1964 2672 gfdhxdh.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4232 2296 WerFault.exe 91 2852 4184 WerFault.exe 100 4572 4424 WerFault.exe 99 -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe 3076 gfdhxdh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2192 gfdhxdh.exe Token: SeDebugPrivilege 2672 gfdhxdh.exe Token: SeDebugPrivilege 3076 gfdhxdh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2056 wrote to memory of 3612 2056 Betaling.exe 86 PID 2056 wrote to memory of 3612 2056 Betaling.exe 86 PID 2056 wrote to memory of 3612 2056 Betaling.exe 86 PID 3612 wrote to memory of 5072 3612 cmd.exe 89 PID 3612 wrote to memory of 5072 3612 cmd.exe 89 PID 3612 wrote to memory of 5072 3612 cmd.exe 89 PID 5072 wrote to memory of 2192 5072 gfdhxdh.sfx.exe 90 PID 5072 wrote to memory of 2192 5072 gfdhxdh.sfx.exe 90 PID 5072 wrote to memory of 2192 5072 gfdhxdh.sfx.exe 90 PID 2192 wrote to memory of 2296 2192 gfdhxdh.exe 91 PID 2192 wrote to memory of 2296 2192 gfdhxdh.exe 91 PID 2192 wrote to memory of 2296 2192 gfdhxdh.exe 91 PID 2192 wrote to memory of 2296 2192 gfdhxdh.exe 91 PID 2192 wrote to memory of 2296 2192 gfdhxdh.exe 91 PID 2192 wrote to memory of 2296 2192 gfdhxdh.exe 91 PID 2192 wrote to memory of 2296 2192 gfdhxdh.exe 91 PID 2192 wrote to memory of 2296 2192 gfdhxdh.exe 91 PID 2192 wrote to memory of 3236 2192 gfdhxdh.exe 92 PID 2192 wrote to memory of 3236 2192 gfdhxdh.exe 92 PID 2192 wrote to memory of 3236 2192 gfdhxdh.exe 92 PID 2192 wrote to memory of 3236 2192 gfdhxdh.exe 92 PID 2192 wrote to memory of 3236 2192 gfdhxdh.exe 92 PID 2192 wrote to memory of 3236 2192 gfdhxdh.exe 92 PID 2192 wrote to memory of 3236 2192 gfdhxdh.exe 92 PID 2192 wrote to memory of 3236 2192 gfdhxdh.exe 92 PID 2192 wrote to memory of 3076 2192 gfdhxdh.exe 94 PID 2192 wrote to memory of 3076 2192 gfdhxdh.exe 94 PID 2192 wrote to memory of 3076 2192 gfdhxdh.exe 94 PID 2192 wrote to memory of 3076 2192 gfdhxdh.exe 94 PID 2192 wrote to memory of 3076 2192 gfdhxdh.exe 94 PID 2192 wrote to memory of 3076 2192 gfdhxdh.exe 94 PID 2192 wrote to memory of 3076 2192 gfdhxdh.exe 94 PID 2192 wrote to memory of 3076 2192 gfdhxdh.exe 94 PID 2192 wrote to memory of 4344 2192 gfdhxdh.exe 95 PID 2192 wrote to memory of 4344 2192 gfdhxdh.exe 95 PID 2192 wrote to memory of 4344 2192 gfdhxdh.exe 95 PID 2192 wrote to memory of 4344 2192 gfdhxdh.exe 95 PID 2192 wrote to memory of 4344 2192 gfdhxdh.exe 95 PID 2192 wrote to memory of 4344 2192 gfdhxdh.exe 95 PID 2192 wrote to memory of 4344 2192 gfdhxdh.exe 95 PID 2192 wrote to memory of 4344 2192 gfdhxdh.exe 95 PID 3236 wrote to memory of 2672 3236 gfdhxdh.exe 98 PID 3236 wrote to memory of 2672 3236 gfdhxdh.exe 98 PID 3236 wrote to memory of 2672 3236 gfdhxdh.exe 98 PID 2672 wrote to memory of 4424 2672 gfdhxdh.exe 99 PID 2672 wrote to memory of 4424 2672 gfdhxdh.exe 99 PID 2672 wrote to memory of 4424 2672 gfdhxdh.exe 99 PID 2672 wrote to memory of 4424 2672 gfdhxdh.exe 99 PID 2672 wrote to memory of 4424 2672 gfdhxdh.exe 99 PID 2672 wrote to memory of 4424 2672 gfdhxdh.exe 99 PID 2672 wrote to memory of 4424 2672 gfdhxdh.exe 99 PID 2672 wrote to memory of 4424 2672 gfdhxdh.exe 99 PID 2672 wrote to memory of 4184 2672 gfdhxdh.exe 100 PID 2672 wrote to memory of 4184 2672 gfdhxdh.exe 100 PID 2672 wrote to memory of 4184 2672 gfdhxdh.exe 100 PID 2672 wrote to memory of 4184 2672 gfdhxdh.exe 100 PID 2672 wrote to memory of 4184 2672 gfdhxdh.exe 100 PID 2672 wrote to memory of 4184 2672 gfdhxdh.exe 100 PID 2672 wrote to memory of 4184 2672 gfdhxdh.exe 100 PID 2672 wrote to memory of 4184 2672 gfdhxdh.exe 100 PID 2672 wrote to memory of 4504 2672 gfdhxdh.exe 102 PID 2672 wrote to memory of 4504 2672 gfdhxdh.exe 102 PID 2672 wrote to memory of 4504 2672 gfdhxdh.exe 102 PID 2672 wrote to memory of 4504 2672 gfdhxdh.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Betaling.exe"C:\Users\Admin\AppData\Local\Temp\Betaling.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\ghjostsdf.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Roaming\gfdhxdh.sfx.exegfdhxdh.sfx.exe -piujmhngbfvdsdyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeN -dC:\Users\Admin\AppData\Roaming3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Roaming\gfdhxdh.exe"C:\Users\Admin\AppData\Roaming\gfdhxdh.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Roaming\gfdhxdh.exeC:\Users\Admin\AppData\Roaming\gfdhxdh.exe5⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 806⤵
- Program crash
PID:4232
-
-
-
C:\Users\Admin\AppData\Roaming\gfdhxdh.exeC:\Users\Admin\AppData\Roaming\gfdhxdh.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exe"C:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exeC:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exe7⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 1528⤵
- Program crash
PID:4572
-
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exeC:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exe7⤵
- Executes dropped EXE
PID:4184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 808⤵
- Program crash
PID:2852
-
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exeC:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exe7⤵
- Executes dropped EXE
PID:4504
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exeC:\Users\Admin\AppData\Roaming\XenoManager\gfdhxdh.exe7⤵
- Executes dropped EXE
PID:1964
-
-
-
-
C:\Users\Admin\AppData\Roaming\gfdhxdh.exeC:\Users\Admin\AppData\Roaming\gfdhxdh.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "bel" /XML "C:\Users\Admin\AppData\Local\Temp\tmp726C.tmp" /F6⤵
- Scheduled Task/Job: Scheduled Task
PID:2284
-
-
-
C:\Users\Admin\AppData\Roaming\gfdhxdh.exeC:\Users\Admin\AppData\Roaming\gfdhxdh.exe5⤵
- Executes dropped EXE
PID:4344
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2296 -ip 22961⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4424 -ip 44241⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4184 -ip 41841⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
1KB
MD5577384a850f9de8e4eea4e7176cdc514
SHA1af61b52b727df630b06225c9e0ce920ea26e4399
SHA25692a8ef2da06cc49894605f45ce83894ab93d772fa31e78d59be6118682c16859
SHA51245a809ce780d9f96f9c57c7db23b0221c5caf81ca5b43f2e97f6288a376d9928bf3109e28a04aae8d5c2227c2bc47b284d8d5cafd4d50cffd4fb1009a6f9982a
-
Filesize
447KB
MD5ae15cae1d0c81ba873c1cf558fead841
SHA17d36c27dfe47a2fe5820af90cedca2de6d93031a
SHA256c696a4f2ed661c6282b957c16d04ec16114fcbab6153033a5f1f663d5dad129d
SHA51263d4daf40ad7be15bd9e0527da89a84a26cfe1843456aa16bf0c9c7fe339aab621920ade0888e9fcd373f0e6fec14fb5ce8731485d307ab43d30f6c772072392
-
Filesize
570KB
MD5e3971905e8de0b85cd2631acd6cd9aca
SHA1acb6bc0d6b457596a9fbe611f75d4968cb2b6e30
SHA256e2f1f0c71ec63d9a715bd284d9b772aa95c237736a6f535bd6d6d09ef8256fb9
SHA51206abf1248917a91ab2cf425e9edf89a01fb105dfd092df11b0715ddc7361adb6f37b1826e7e1f46329583fcd9fde5ce8a10b2bf3463206aea560d0d8a6e5ca5e
-
Filesize
18KB
MD5222aeeb413ba16970dd3c02ad9abc0ce
SHA19ca9e96092d679eb228ca12e56df0495b0596e88
SHA2561061cee35ae6a842f744991c1e42fadb47f445a1504abe161480da8e5e3ed2fc
SHA512c58822e5492714a74e12f84bea3027e61a6f2a40c9200da3886f59b1291ed9a8bd244e4af7b2017fcd15a790b093cb013d566a196b1539760c33e6afe0284504