Analysis
-
max time kernel
45s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-07-2024 20:20
Behavioral task
behavioral1
Sample
niggii.exe
Resource
win10v2004-20240709-en
General
-
Target
niggii.exe
-
Size
45KB
-
MD5
24cd3bf3db0659796d6df7ca25aaa8e5
-
SHA1
9b6b6abad7f003cf4d14625cf8eb119ff00a29a9
-
SHA256
f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714
-
SHA512
5dd98bdde5a47c127d6ae90ab6d9d752b126b2c5ccae72296450c5ac6d552475180a995fb476c96b4ed443f9f5fc3a4e85536180eecb22ed87b45adee547c6ca
-
SSDEEP
768:ZdhO/poiiUcjlJInaCLue9H9Xqk5nWEZ5SbTDaQWI7CPW5I:Xw+jjgn1ye9H9XqcnW85SbTRWIA
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Windows Updater
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1400 niggii.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4924 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3532 wrote to memory of 1400 3532 niggii.exe 78 PID 3532 wrote to memory of 1400 3532 niggii.exe 78 PID 3532 wrote to memory of 1400 3532 niggii.exe 78 PID 1400 wrote to memory of 4924 1400 niggii.exe 79 PID 1400 wrote to memory of 4924 1400 niggii.exe 79 PID 1400 wrote to memory of 4924 1400 niggii.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\niggii.exe"C:\Users\Admin\AppData\Local\Temp\niggii.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Roaming\XenoManager\niggii.exe"C:\Users\Admin\AppData\Roaming\XenoManager\niggii.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8386.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:4924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
1KB
MD5a3aaae2bd3745a39ee7073a73967a8c0
SHA193fae8e5b632a565a78c8066cf0b73b048eef846
SHA256a5446d2de4b04a35244706cc3a0029fbfd2de17ff8c4f2e6856b49bae0a9dac6
SHA512a8b797dfcdaa2187daad3b63afcd47cf2aad740ce9483c4c7ab16c8c20c4bb7e52006dcd340699af0e269d3898a26d71def3d7e1458db7cbdcfdc0316f5c4676
-
Filesize
45KB
MD524cd3bf3db0659796d6df7ca25aaa8e5
SHA19b6b6abad7f003cf4d14625cf8eb119ff00a29a9
SHA256f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714
SHA5125dd98bdde5a47c127d6ae90ab6d9d752b126b2c5ccae72296450c5ac6d552475180a995fb476c96b4ed443f9f5fc3a4e85536180eecb22ed87b45adee547c6ca