Analysis
-
max time kernel
33s -
max time network
33s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-07-2024 20:09
General
-
Target
niggii.exe
-
Size
45KB
-
MD5
24cd3bf3db0659796d6df7ca25aaa8e5
-
SHA1
9b6b6abad7f003cf4d14625cf8eb119ff00a29a9
-
SHA256
f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714
-
SHA512
5dd98bdde5a47c127d6ae90ab6d9d752b126b2c5ccae72296450c5ac6d552475180a995fb476c96b4ed443f9f5fc3a4e85536180eecb22ed87b45adee547c6ca
-
SSDEEP
768:ZdhO/poiiUcjlJInaCLue9H9Xqk5nWEZ5SbTDaQWI7CPW5I:Xw+jjgn1ye9H9XqcnW85SbTRWIA
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Windows Updater
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4772 niggii.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2724 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5044 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 228 wrote to memory of 4772 228 niggii.exe 78 PID 228 wrote to memory of 4772 228 niggii.exe 78 PID 228 wrote to memory of 4772 228 niggii.exe 78 PID 4772 wrote to memory of 2724 4772 niggii.exe 79 PID 4772 wrote to memory of 2724 4772 niggii.exe 79 PID 4772 wrote to memory of 2724 4772 niggii.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\niggii.exe"C:\Users\Admin\AppData\Local\Temp\niggii.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Roaming\XenoManager\niggii.exe"C:\Users\Admin\AppData\Roaming\XenoManager\niggii.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD4D4.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2724
-
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD51015d2fd919a3b62e193194c7bfafbef
SHA1f7f3314dd817edcee90f87491f74825b197f476b
SHA256990002e556b74d16e89d7f6c8be6ac5870e9be8b904ec52e87d92631fa09467b
SHA512ffc7702179fb30851f4646f26a53e87c0215e320e117901c726a6294bf428540134e1fd14fce37a0b430e8379b4c56d6f57b582efff5654e2ed4624453762bea
-
Filesize
1KB
MD5a3aaae2bd3745a39ee7073a73967a8c0
SHA193fae8e5b632a565a78c8066cf0b73b048eef846
SHA256a5446d2de4b04a35244706cc3a0029fbfd2de17ff8c4f2e6856b49bae0a9dac6
SHA512a8b797dfcdaa2187daad3b63afcd47cf2aad740ce9483c4c7ab16c8c20c4bb7e52006dcd340699af0e269d3898a26d71def3d7e1458db7cbdcfdc0316f5c4676
-
Filesize
45KB
MD524cd3bf3db0659796d6df7ca25aaa8e5
SHA19b6b6abad7f003cf4d14625cf8eb119ff00a29a9
SHA256f87ced677e847b5b9859b768f059c2e6a8e5cc7ad4d3770d2d0ab6be5d4f3714
SHA5125dd98bdde5a47c127d6ae90ab6d9d752b126b2c5ccae72296450c5ac6d552475180a995fb476c96b4ed443f9f5fc3a4e85536180eecb22ed87b45adee547c6ca