Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 01:20
Behavioral task
behavioral1
Sample
LisectAVT_2403002B_374.exe
Resource
win7-20240704-en
General
-
Target
LisectAVT_2403002B_374.exe
-
Size
51KB
-
MD5
a6f078369a4601c8410bafbbab7c1699
-
SHA1
2f7f05fa31afc889ebb07ac81ead20633eb9bf42
-
SHA256
c8aba6ff578066859f0d1e9108857cda5ddf8345761d2df01f361cf1dd1b2c40
-
SHA512
acf515ba9c1af71953177f6d411fb217ecc416ef75d5f533caa02665aa0ed41b255f7a33d15646ec7e67395e8594e033302c2cc7c06b137370464e815a1c8bcf
-
SSDEEP
768:ECivdjHrddilbVauou79Eo8Wq8vBvyHuBSkGu2yPo+LGZYebFDa026RNSgNOd/:EbpHmVauo3mXvNDj6CSYebFxTf4F
Malware Config
Extracted
xenorat
37.120.141.155
123444
-
delay
5000
-
install_path
appdata
-
port
22914
-
startup_name
WinSCVUpdate
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation LisectAVT_2403002B_374.exe -
Executes dropped EXE 1 IoCs
pid Process 4772 LisectAVT_2403002B_374.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LisectAVT_2403002B_374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LisectAVT_2403002B_374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2668 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 972 wrote to memory of 4772 972 LisectAVT_2403002B_374.exe 86 PID 972 wrote to memory of 4772 972 LisectAVT_2403002B_374.exe 86 PID 972 wrote to memory of 4772 972 LisectAVT_2403002B_374.exe 86 PID 4772 wrote to memory of 2668 4772 LisectAVT_2403002B_374.exe 92 PID 4772 wrote to memory of 2668 4772 LisectAVT_2403002B_374.exe 92 PID 4772 wrote to memory of 2668 4772 LisectAVT_2403002B_374.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_374.exe"C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_374.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Roaming\XenoManager\LisectAVT_2403002B_374.exe"C:\Users\Admin\AppData\Roaming\XenoManager\LisectAVT_2403002B_374.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "WinSCVUpdate" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9BE2.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD577be835e86de68176f9e0199c283e7d9
SHA19cdbc8f9c3337dc9a00cceeac47e7a61dafd50c9
SHA2563011b7d57cac3880c439ab09258231b060525091f5c60c8630a8d85004870873
SHA5120c7503086208759fa8ec4b8713c2de8faadc3f104b6b73e0efc9f83f2c44c4f881897402e1160703ac62f4be8913ad880645773893a9584d13a8ef125cb0765b
-
Filesize
51KB
MD5a6f078369a4601c8410bafbbab7c1699
SHA12f7f05fa31afc889ebb07ac81ead20633eb9bf42
SHA256c8aba6ff578066859f0d1e9108857cda5ddf8345761d2df01f361cf1dd1b2c40
SHA512acf515ba9c1af71953177f6d411fb217ecc416ef75d5f533caa02665aa0ed41b255f7a33d15646ec7e67395e8594e033302c2cc7c06b137370464e815a1c8bcf