Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
e74db56e352d5015304af19ec21ffeb5.exe
Resource
win7-20240705-en
General
-
Target
e74db56e352d5015304af19ec21ffeb5.exe
-
Size
253KB
-
MD5
e74db56e352d5015304af19ec21ffeb5
-
SHA1
cf026e98f937ea8989a789fa8e43895f3f642431
-
SHA256
54eafd9bd8105444ccd57e92dc3bee43166532da0a71e26686fe9913956f6243
-
SHA512
32854f3b960a17c9051714d4b456517607f21e57547c6711b4ae2020c54462ca554edc01d789052a66e082637ed6cf9854e624b6d938c6c852a282de13299dc2
-
SSDEEP
6144:fK0vMcNP/YJ4/OmWMDJBP1FOHu10jc9ppUATB4KQK0f6nYSr8Kg0I:fK0vDE4dDJN6Hu10jcraOB4KQK0f6nYX
Malware Config
Extracted
xenorat
45.66.231.63
Holid_rat_nd8859g
-
delay
60400
-
install_path
appdata
-
port
1243
-
startup_name
HDdisplay
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation e74db56e352d5015304af19ec21ffeb5.exe -
Executes dropped EXE 5 IoCs
pid Process 4284 e74db56e352d5015304af19ec21ffeb5.exe 4976 e74db56e352d5015304af19ec21ffeb5.exe 4420 e74db56e352d5015304af19ec21ffeb5.exe 2256 e74db56e352d5015304af19ec21ffeb5.exe 1336 e74db56e352d5015304af19ec21ffeb5.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2880 set thread context of 4060 2880 e74db56e352d5015304af19ec21ffeb5.exe 87 PID 2880 set thread context of 5016 2880 e74db56e352d5015304af19ec21ffeb5.exe 88 PID 2880 set thread context of 2076 2880 e74db56e352d5015304af19ec21ffeb5.exe 89 PID 2880 set thread context of 2080 2880 e74db56e352d5015304af19ec21ffeb5.exe 90 PID 4284 set thread context of 4976 4284 e74db56e352d5015304af19ec21ffeb5.exe 95 PID 4284 set thread context of 4420 4284 e74db56e352d5015304af19ec21ffeb5.exe 96 PID 4284 set thread context of 2256 4284 e74db56e352d5015304af19ec21ffeb5.exe 97 PID 4284 set thread context of 1336 4284 e74db56e352d5015304af19ec21ffeb5.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 844 2080 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74db56e352d5015304af19ec21ffeb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74db56e352d5015304af19ec21ffeb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74db56e352d5015304af19ec21ffeb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74db56e352d5015304af19ec21ffeb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74db56e352d5015304af19ec21ffeb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74db56e352d5015304af19ec21ffeb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74db56e352d5015304af19ec21ffeb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74db56e352d5015304af19ec21ffeb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74db56e352d5015304af19ec21ffeb5.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3576 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2880 e74db56e352d5015304af19ec21ffeb5.exe Token: SeDebugPrivilege 4284 e74db56e352d5015304af19ec21ffeb5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 4060 2880 e74db56e352d5015304af19ec21ffeb5.exe 87 PID 2880 wrote to memory of 4060 2880 e74db56e352d5015304af19ec21ffeb5.exe 87 PID 2880 wrote to memory of 4060 2880 e74db56e352d5015304af19ec21ffeb5.exe 87 PID 2880 wrote to memory of 4060 2880 e74db56e352d5015304af19ec21ffeb5.exe 87 PID 2880 wrote to memory of 4060 2880 e74db56e352d5015304af19ec21ffeb5.exe 87 PID 2880 wrote to memory of 4060 2880 e74db56e352d5015304af19ec21ffeb5.exe 87 PID 2880 wrote to memory of 4060 2880 e74db56e352d5015304af19ec21ffeb5.exe 87 PID 2880 wrote to memory of 4060 2880 e74db56e352d5015304af19ec21ffeb5.exe 87 PID 2880 wrote to memory of 5016 2880 e74db56e352d5015304af19ec21ffeb5.exe 88 PID 2880 wrote to memory of 5016 2880 e74db56e352d5015304af19ec21ffeb5.exe 88 PID 2880 wrote to memory of 5016 2880 e74db56e352d5015304af19ec21ffeb5.exe 88 PID 2880 wrote to memory of 5016 2880 e74db56e352d5015304af19ec21ffeb5.exe 88 PID 2880 wrote to memory of 5016 2880 e74db56e352d5015304af19ec21ffeb5.exe 88 PID 2880 wrote to memory of 5016 2880 e74db56e352d5015304af19ec21ffeb5.exe 88 PID 2880 wrote to memory of 5016 2880 e74db56e352d5015304af19ec21ffeb5.exe 88 PID 2880 wrote to memory of 5016 2880 e74db56e352d5015304af19ec21ffeb5.exe 88 PID 2880 wrote to memory of 2076 2880 e74db56e352d5015304af19ec21ffeb5.exe 89 PID 2880 wrote to memory of 2076 2880 e74db56e352d5015304af19ec21ffeb5.exe 89 PID 2880 wrote to memory of 2076 2880 e74db56e352d5015304af19ec21ffeb5.exe 89 PID 2880 wrote to memory of 2076 2880 e74db56e352d5015304af19ec21ffeb5.exe 89 PID 2880 wrote to memory of 2076 2880 e74db56e352d5015304af19ec21ffeb5.exe 89 PID 2880 wrote to memory of 2076 2880 e74db56e352d5015304af19ec21ffeb5.exe 89 PID 2880 wrote to memory of 2076 2880 e74db56e352d5015304af19ec21ffeb5.exe 89 PID 2880 wrote to memory of 2076 2880 e74db56e352d5015304af19ec21ffeb5.exe 89 PID 2880 wrote to memory of 2080 2880 e74db56e352d5015304af19ec21ffeb5.exe 90 PID 2880 wrote to memory of 2080 2880 e74db56e352d5015304af19ec21ffeb5.exe 90 PID 2880 wrote to memory of 2080 2880 e74db56e352d5015304af19ec21ffeb5.exe 90 PID 2880 wrote to memory of 2080 2880 e74db56e352d5015304af19ec21ffeb5.exe 90 PID 2880 wrote to memory of 2080 2880 e74db56e352d5015304af19ec21ffeb5.exe 90 PID 2880 wrote to memory of 2080 2880 e74db56e352d5015304af19ec21ffeb5.exe 90 PID 2880 wrote to memory of 2080 2880 e74db56e352d5015304af19ec21ffeb5.exe 90 PID 2880 wrote to memory of 2080 2880 e74db56e352d5015304af19ec21ffeb5.exe 90 PID 4060 wrote to memory of 4284 4060 e74db56e352d5015304af19ec21ffeb5.exe 94 PID 4060 wrote to memory of 4284 4060 e74db56e352d5015304af19ec21ffeb5.exe 94 PID 4060 wrote to memory of 4284 4060 e74db56e352d5015304af19ec21ffeb5.exe 94 PID 4284 wrote to memory of 4976 4284 e74db56e352d5015304af19ec21ffeb5.exe 95 PID 4284 wrote to memory of 4976 4284 e74db56e352d5015304af19ec21ffeb5.exe 95 PID 4284 wrote to memory of 4976 4284 e74db56e352d5015304af19ec21ffeb5.exe 95 PID 4284 wrote to memory of 4976 4284 e74db56e352d5015304af19ec21ffeb5.exe 95 PID 4284 wrote to memory of 4976 4284 e74db56e352d5015304af19ec21ffeb5.exe 95 PID 4284 wrote to memory of 4976 4284 e74db56e352d5015304af19ec21ffeb5.exe 95 PID 4284 wrote to memory of 4976 4284 e74db56e352d5015304af19ec21ffeb5.exe 95 PID 4284 wrote to memory of 4976 4284 e74db56e352d5015304af19ec21ffeb5.exe 95 PID 4284 wrote to memory of 4420 4284 e74db56e352d5015304af19ec21ffeb5.exe 96 PID 4284 wrote to memory of 4420 4284 e74db56e352d5015304af19ec21ffeb5.exe 96 PID 4284 wrote to memory of 4420 4284 e74db56e352d5015304af19ec21ffeb5.exe 96 PID 4284 wrote to memory of 4420 4284 e74db56e352d5015304af19ec21ffeb5.exe 96 PID 4284 wrote to memory of 4420 4284 e74db56e352d5015304af19ec21ffeb5.exe 96 PID 4284 wrote to memory of 4420 4284 e74db56e352d5015304af19ec21ffeb5.exe 96 PID 4284 wrote to memory of 4420 4284 e74db56e352d5015304af19ec21ffeb5.exe 96 PID 4284 wrote to memory of 4420 4284 e74db56e352d5015304af19ec21ffeb5.exe 96 PID 4284 wrote to memory of 2256 4284 e74db56e352d5015304af19ec21ffeb5.exe 97 PID 4284 wrote to memory of 2256 4284 e74db56e352d5015304af19ec21ffeb5.exe 97 PID 4284 wrote to memory of 2256 4284 e74db56e352d5015304af19ec21ffeb5.exe 97 PID 4284 wrote to memory of 2256 4284 e74db56e352d5015304af19ec21ffeb5.exe 97 PID 4284 wrote to memory of 2256 4284 e74db56e352d5015304af19ec21ffeb5.exe 97 PID 4284 wrote to memory of 2256 4284 e74db56e352d5015304af19ec21ffeb5.exe 97 PID 4284 wrote to memory of 2256 4284 e74db56e352d5015304af19ec21ffeb5.exe 97 PID 4284 wrote to memory of 2256 4284 e74db56e352d5015304af19ec21ffeb5.exe 97 PID 4284 wrote to memory of 1336 4284 e74db56e352d5015304af19ec21ffeb5.exe 98 PID 4284 wrote to memory of 1336 4284 e74db56e352d5015304af19ec21ffeb5.exe 98 PID 4284 wrote to memory of 1336 4284 e74db56e352d5015304af19ec21ffeb5.exe 98 PID 4284 wrote to memory of 1336 4284 e74db56e352d5015304af19ec21ffeb5.exe 98 PID 4284 wrote to memory of 1336 4284 e74db56e352d5015304af19ec21ffeb5.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exe"C:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exeC:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exe"C:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exeC:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exeC:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exeC:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exeC:\Users\Admin\AppData\Roaming\XenoManager\e74db56e352d5015304af19ec21ffeb5.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exeC:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exe2⤵
- System Location Discovery: System Language Discovery
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exeC:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exe2⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\Admin\AppData\Local\Temp\tmp91AC.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3576
-
-
-
C:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exeC:\Users\Admin\AppData\Local\Temp\e74db56e352d5015304af19ec21ffeb5.exe2⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 803⤵
- Program crash
PID:844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2080 -ip 20801⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e74db56e352d5015304af19ec21ffeb5.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD50b4843e0c2d775309a123f5dfdf51f02
SHA1e6925346d0917aef4d4f2adb0002cc7a95d397c3
SHA25606a95732eb47930615477e517dd484abaf7cd3981ab2c617d3b0111e3fca270f
SHA512f308aa852994bcb99b97d4ee64743d71d900bc57fe246e3a2b6f5110fc5a54f989a7e6c3526de7dab184b46926417e8b2c70f073dbb33455e5edc82f42ee7df3
-
Filesize
253KB
MD5e74db56e352d5015304af19ec21ffeb5
SHA1cf026e98f937ea8989a789fa8e43895f3f642431
SHA25654eafd9bd8105444ccd57e92dc3bee43166532da0a71e26686fe9913956f6243
SHA51232854f3b960a17c9051714d4b456517607f21e57547c6711b4ae2020c54462ca554edc01d789052a66e082637ed6cf9854e624b6d938c6c852a282de13299dc2