Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 01:20
Behavioral task
behavioral1
Sample
LisectAVT_2403002B_374.exe
Resource
win7-20240704-en
General
-
Target
LisectAVT_2403002B_374.exe
-
Size
51KB
-
MD5
a6f078369a4601c8410bafbbab7c1699
-
SHA1
2f7f05fa31afc889ebb07ac81ead20633eb9bf42
-
SHA256
c8aba6ff578066859f0d1e9108857cda5ddf8345761d2df01f361cf1dd1b2c40
-
SHA512
acf515ba9c1af71953177f6d411fb217ecc416ef75d5f533caa02665aa0ed41b255f7a33d15646ec7e67395e8594e033302c2cc7c06b137370464e815a1c8bcf
-
SSDEEP
768:ECivdjHrddilbVauou79Eo8Wq8vBvyHuBSkGu2yPo+LGZYebFDa026RNSgNOd/:EbpHmVauo3mXvNDj6CSYebFxTf4F
Malware Config
Extracted
xenorat
37.120.141.155
123444
-
delay
5000
-
install_path
appdata
-
port
22914
-
startup_name
WinSCVUpdate
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2332 LisectAVT_2403002B_374.exe -
Loads dropped DLL 1 IoCs
pid Process 624 LisectAVT_2403002B_374.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LisectAVT_2403002B_374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LisectAVT_2403002B_374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2296 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 624 wrote to memory of 2332 624 LisectAVT_2403002B_374.exe 30 PID 624 wrote to memory of 2332 624 LisectAVT_2403002B_374.exe 30 PID 624 wrote to memory of 2332 624 LisectAVT_2403002B_374.exe 30 PID 624 wrote to memory of 2332 624 LisectAVT_2403002B_374.exe 30 PID 2332 wrote to memory of 2296 2332 LisectAVT_2403002B_374.exe 31 PID 2332 wrote to memory of 2296 2332 LisectAVT_2403002B_374.exe 31 PID 2332 wrote to memory of 2296 2332 LisectAVT_2403002B_374.exe 31 PID 2332 wrote to memory of 2296 2332 LisectAVT_2403002B_374.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_374.exe"C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_374.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Roaming\XenoManager\LisectAVT_2403002B_374.exe"C:\Users\Admin\AppData\Roaming\XenoManager\LisectAVT_2403002B_374.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "WinSCVUpdate" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFFD2.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD577be835e86de68176f9e0199c283e7d9
SHA19cdbc8f9c3337dc9a00cceeac47e7a61dafd50c9
SHA2563011b7d57cac3880c439ab09258231b060525091f5c60c8630a8d85004870873
SHA5120c7503086208759fa8ec4b8713c2de8faadc3f104b6b73e0efc9f83f2c44c4f881897402e1160703ac62f4be8913ad880645773893a9584d13a8ef125cb0765b
-
Filesize
51KB
MD5a6f078369a4601c8410bafbbab7c1699
SHA12f7f05fa31afc889ebb07ac81ead20633eb9bf42
SHA256c8aba6ff578066859f0d1e9108857cda5ddf8345761d2df01f361cf1dd1b2c40
SHA512acf515ba9c1af71953177f6d411fb217ecc416ef75d5f533caa02665aa0ed41b255f7a33d15646ec7e67395e8594e033302c2cc7c06b137370464e815a1c8bcf