Analysis
-
max time kernel
114s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 11:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a82bfd5e62292dd3819e30203bf3d600N.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
120 seconds
General
-
Target
a82bfd5e62292dd3819e30203bf3d600N.exe
-
Size
62KB
-
MD5
a82bfd5e62292dd3819e30203bf3d600
-
SHA1
45f9ad119f1fcde707e9f1d48a8f2d321e5728bb
-
SHA256
332c5041438fb488709b351f39dc5dcdaeb11f575a6330ce9f77811e9e22d16f
-
SHA512
d42a6809638575457426dd0b75a76627a4cc55f21d8f7d0990491d299b07fff7c2e4674ce6835ccf3e788767fe6b451a2e254afcea451c74bfb21c12aa856bd5
-
SSDEEP
1536:QGfpH0kPZMak9VeXOCey6+yjjPhWzkDalm3x42oQF6atdf:vWak94ey6+yjj8QGlmh4QF6atdf
Malware Config
Extracted
Family
xenorat
C2
192.168.100.111
Mutex
andrei
Attributes
-
delay
3000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2780 set thread context of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2780 a82bfd5e62292dd3819e30203bf3d600N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2780 a82bfd5e62292dd3819e30203bf3d600N.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2848 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 30 PID 2780 wrote to memory of 2848 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 30 PID 2780 wrote to memory of 2848 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 30 PID 2780 wrote to memory of 2848 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 30 PID 2780 wrote to memory of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31 PID 2780 wrote to memory of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31 PID 2780 wrote to memory of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31 PID 2780 wrote to memory of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31 PID 2780 wrote to memory of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31 PID 2780 wrote to memory of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31 PID 2780 wrote to memory of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31 PID 2780 wrote to memory of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31 PID 2780 wrote to memory of 2840 2780 a82bfd5e62292dd3819e30203bf3d600N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a82bfd5e62292dd3819e30203bf3d600N.exe"C:\Users\Admin\AppData\Local\Temp\a82bfd5e62292dd3819e30203bf3d600N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\a82bfd5e62292dd3819e30203bf3d600N.exe"C:\Users\Admin\AppData\Local\Temp\a82bfd5e62292dd3819e30203bf3d600N.exe"2⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\a82bfd5e62292dd3819e30203bf3d600N.exe"C:\Users\Admin\AppData\Local\Temp\a82bfd5e62292dd3819e30203bf3d600N.exe"2⤵PID:2840
-