Analysis
-
max time kernel
117s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 09:58
Behavioral task
behavioral1
Sample
a895d7d9f0c011e6a09f8695f70ec220N.exe
Resource
win7-20240708-en
General
-
Target
a895d7d9f0c011e6a09f8695f70ec220N.exe
-
Size
45KB
-
MD5
a895d7d9f0c011e6a09f8695f70ec220
-
SHA1
6e35cb9b2e0ffab5473b00021214e903509ed631
-
SHA256
b9b83591b6ebb1d96f9663e95b330f628f294fa8f6bb7703a6f3c9333b7e1c93
-
SHA512
87f0fd72d1e15a0748db53ce174c5aae33c72654fd6821d4582f5711432f6a070b0b619f5b244f932d7b3a86ab269f06ab43baa308bbc52e46837adac2a48926
-
SSDEEP
768:FdhO/poiiUcjlJInozH9Xqk5nWEZ5SbTDaDWI7CPW59:bw+jjgn6H9XqcnW85SbTyWIV
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
1000
-
startup_name
setup
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation a895d7d9f0c011e6a09f8695f70ec220N.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 a895d7d9f0c011e6a09f8695f70ec220N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3004 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2644 3944 a895d7d9f0c011e6a09f8695f70ec220N.exe 85 PID 3944 wrote to memory of 2644 3944 a895d7d9f0c011e6a09f8695f70ec220N.exe 85 PID 3944 wrote to memory of 2644 3944 a895d7d9f0c011e6a09f8695f70ec220N.exe 85 PID 2644 wrote to memory of 3004 2644 a895d7d9f0c011e6a09f8695f70ec220N.exe 92 PID 2644 wrote to memory of 3004 2644 a895d7d9f0c011e6a09f8695f70ec220N.exe 92 PID 2644 wrote to memory of 3004 2644 a895d7d9f0c011e6a09f8695f70ec220N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a895d7d9f0c011e6a09f8695f70ec220N.exe"C:\Users\Admin\AppData\Local\Temp\a895d7d9f0c011e6a09f8695f70ec220N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Roaming\XenoManager\a895d7d9f0c011e6a09f8695f70ec220N.exe"C:\Users\Admin\AppData\Roaming\XenoManager\a895d7d9f0c011e6a09f8695f70ec220N.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "setup" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAC1E.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a895d7d9f0c011e6a09f8695f70ec220N.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5a3f1901c52f2001cbcd8daf4ff40062e
SHA1b0baaedf0628dcd18484e75bdf389e8a07e84b00
SHA256822014c3519c42f757dc5bc5f4a3c1b806b86692e0d936ae2d7122c24340b01b
SHA512e09409980e24ee21b1672393517e0cf223e366c8f02e21580e7867aa10d0896b2b08442da85cb79fa4dc78f838541e67058ae029fa43bd702288393f07a546e9
-
Filesize
45KB
MD5a895d7d9f0c011e6a09f8695f70ec220
SHA16e35cb9b2e0ffab5473b00021214e903509ed631
SHA256b9b83591b6ebb1d96f9663e95b330f628f294fa8f6bb7703a6f3c9333b7e1c93
SHA51287f0fd72d1e15a0748db53ce174c5aae33c72654fd6821d4582f5711432f6a070b0b619f5b244f932d7b3a86ab269f06ab43baa308bbc52e46837adac2a48926