Analysis
-
max time kernel
45s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 20:20
Behavioral task
behavioral1
Sample
niggii.exe
Resource
win10v2004-20240709-en
General
-
Target
niggii.exe
-
Size
45KB
-
MD5
24cd3bf3db0659796d6df7ca25aaa8e5
-
SHA1
9b6b6abad7f003cf4d14625cf8eb119ff00a29a9
-
SHA256
f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714
-
SHA512
5dd98bdde5a47c127d6ae90ab6d9d752b126b2c5ccae72296450c5ac6d552475180a995fb476c96b4ed443f9f5fc3a4e85536180eecb22ed87b45adee547c6ca
-
SSDEEP
768:ZdhO/poiiUcjlJInaCLue9H9Xqk5nWEZ5SbTDaQWI7CPW5I:Xw+jjgn1ye9H9XqcnW85SbTRWIA
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Windows Updater
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation niggii.exe -
Executes dropped EXE 1 IoCs
pid Process 444 niggii.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2032 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4304 wrote to memory of 444 4304 niggii.exe 87 PID 4304 wrote to memory of 444 4304 niggii.exe 87 PID 4304 wrote to memory of 444 4304 niggii.exe 87 PID 444 wrote to memory of 2032 444 niggii.exe 88 PID 444 wrote to memory of 2032 444 niggii.exe 88 PID 444 wrote to memory of 2032 444 niggii.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\niggii.exe"C:\Users\Admin\AppData\Local\Temp\niggii.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Roaming\XenoManager\niggii.exe"C:\Users\Admin\AppData\Roaming\XenoManager\niggii.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBDE1.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5a3aaae2bd3745a39ee7073a73967a8c0
SHA193fae8e5b632a565a78c8066cf0b73b048eef846
SHA256a5446d2de4b04a35244706cc3a0029fbfd2de17ff8c4f2e6856b49bae0a9dac6
SHA512a8b797dfcdaa2187daad3b63afcd47cf2aad740ce9483c4c7ab16c8c20c4bb7e52006dcd340699af0e269d3898a26d71def3d7e1458db7cbdcfdc0316f5c4676
-
Filesize
45KB
MD524cd3bf3db0659796d6df7ca25aaa8e5
SHA19b6b6abad7f003cf4d14625cf8eb119ff00a29a9
SHA256f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714
SHA5125dd98bdde5a47c127d6ae90ab6d9d752b126b2c5ccae72296450c5ac6d552475180a995fb476c96b4ed443f9f5fc3a4e85536180eecb22ed87b45adee547c6ca