Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 11:50
Behavioral task
behavioral1
Sample
TransAgenda.exe
Resource
win7-20240705-en
General
-
Target
TransAgenda.exe
-
Size
127KB
-
MD5
8dbebef8a47ea96ceed4408641e195ce
-
SHA1
b13a236bdf60de5fac38ab11344392eadb7462a9
-
SHA256
2bee910afaec59b55af87e2056a52cc43d879a2582dc5d148bcf696ddbd0516d
-
SHA512
9159cf5a19963d73d947cf17db303eb84353a0237b03bb61fc553b6945f3c670da79cc5185211a793effa191ef438f0ce3f1b894dde3983cc068adce0757540d
-
SSDEEP
3072:9w+jqT91UbTkTxswif42DRk1u1F33bIWQD4agDUbjwAGy7:qW291UbuqfhdkY1F3rTQD4agwfwby
Malware Config
Extracted
xenorat
174.60.140.164
Xeno_rat_nd8912f
-
delay
5000
-
install_path
appdata
-
port
7707
-
startup_name
TransAgenda
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1728 TransAgenda.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 TransAgenda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2360 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1728 3040 TransAgenda.exe 30 PID 3040 wrote to memory of 1728 3040 TransAgenda.exe 30 PID 3040 wrote to memory of 1728 3040 TransAgenda.exe 30 PID 3040 wrote to memory of 1728 3040 TransAgenda.exe 30 PID 1728 wrote to memory of 2360 1728 TransAgenda.exe 31 PID 1728 wrote to memory of 2360 1728 TransAgenda.exe 31 PID 1728 wrote to memory of 2360 1728 TransAgenda.exe 31 PID 1728 wrote to memory of 2360 1728 TransAgenda.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\TransAgenda.exe"C:\Users\Admin\AppData\Local\Temp\TransAgenda.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Roaming\XenoManager\TransAgenda.exe"C:\Users\Admin\AppData\Roaming\XenoManager\TransAgenda.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "TransAgenda" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEA1.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9c1f7e3003f94a8c0313a0dc0724247
SHA1c175bfbdeed865347102f9f709808ab69ef558f5
SHA2568847403fa9782db190ff467a63a6d84af09ad173a4fed107a9b11aee0cf26e26
SHA512fc86570456b8d7f1f01c5f8580ace3c627e7368640c704471787831bd58829ce99ee7f0a6cfea601f9038602e4988f769a16e4016790af76431d6ccb54983b37
-
Filesize
127KB
MD58dbebef8a47ea96ceed4408641e195ce
SHA1b13a236bdf60de5fac38ab11344392eadb7462a9
SHA2562bee910afaec59b55af87e2056a52cc43d879a2582dc5d148bcf696ddbd0516d
SHA5129159cf5a19963d73d947cf17db303eb84353a0237b03bb61fc553b6945f3c670da79cc5185211a793effa191ef438f0ce3f1b894dde3983cc068adce0757540d