Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 18:58
Behavioral task
behavioral1
Sample
NovaDebug.exe
Resource
win10v2004-20240709-en
General
-
Target
NovaDebug.exe
-
Size
45KB
-
MD5
09e75c0a0f5f0e839d23ac80a6b38d56
-
SHA1
d36e6d2f7e59f451cae5d9b18fbe0c14bf73f134
-
SHA256
e14421ff6b1d53b35cf713c08e3025c8db7f8a55b7e40b5e8c787bb6bf441030
-
SHA512
bd1a267b2d2e74d5a7da323dfdd77382458722af89cbc75d8a6ada9e7125bb0118458f2a5b7b17a31d05b527a9edcf43428c057bddee3498621869bbdaa3365f
-
SSDEEP
768:9dhO/poiiUcjlJInIzH9Xqk5nWEZ5SbTDaLWI7CPW5P:zw+jjgnKH9XqcnW85SbT6WI3
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
1294
-
startup_name
NovaDebug
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation NovaDebug.exe -
Executes dropped EXE 1 IoCs
pid Process 208 NovaDebug.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2848 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4388 wrote to memory of 208 4388 NovaDebug.exe 88 PID 4388 wrote to memory of 208 4388 NovaDebug.exe 88 PID 4388 wrote to memory of 208 4388 NovaDebug.exe 88 PID 208 wrote to memory of 2848 208 NovaDebug.exe 93 PID 208 wrote to memory of 2848 208 NovaDebug.exe 93 PID 208 wrote to memory of 2848 208 NovaDebug.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NovaDebug.exe"C:\Users\Admin\AppData\Local\Temp\NovaDebug.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Roaming\XenoManager\NovaDebug.exe"C:\Users\Admin\AppData\Roaming\XenoManager\NovaDebug.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "NovaDebug" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB045.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2848
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5b7c99dc09c1ff341236a76f805fc75b2
SHA1767a6d13ae843c9aa036c2f698254694c3a6fd22
SHA256b7145535737b8d1541a81110ecfff5f0fa1cf18becc79451b449b1b593f84f47
SHA51254cc8402d38fbaaf1bbc6846488232e8ea3be5635cf4bdeed506f5d62c33802d03eeddc5d855853fab70650f9d724c1c539eb1239982cb137a0c3de820efa3e3
-
Filesize
45KB
MD509e75c0a0f5f0e839d23ac80a6b38d56
SHA1d36e6d2f7e59f451cae5d9b18fbe0c14bf73f134
SHA256e14421ff6b1d53b35cf713c08e3025c8db7f8a55b7e40b5e8c787bb6bf441030
SHA512bd1a267b2d2e74d5a7da323dfdd77382458722af89cbc75d8a6ada9e7125bb0118458f2a5b7b17a31d05b527a9edcf43428c057bddee3498621869bbdaa3365f