Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895.exe
Resource
win10v2004-20240709-en
General
-
Target
a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895.exe
-
Size
614KB
-
MD5
88696cf17417a2339b63f9452404c839
-
SHA1
2123ca0e3764ba65e421d3b5dd7453da955d36f2
-
SHA256
a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895
-
SHA512
a4236f6d52b985420dc733998842815fd24f12236bdbf3b885ed9a15c0d4815dec439cf919925b4b903ac158aba1ba2a8bf9eff20af7134d2e4edbce226f7931
-
SSDEEP
12288:WcrNS33L10QdrX2ZVncWqvo2GAhcWMuql8lPtahdkkB183kD:FNA3R5drXwVcWWyLZ8db3kD
Malware Config
Extracted
xenorat
45.66.231.63
Holid_rat_nd8859g
-
delay
60400
-
install_path
appdata
-
port
1243
-
startup_name
HDdisplay
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation efthfxj.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation efthfxj.exe -
Executes dropped EXE 11 IoCs
pid Process 4540 efthfxj.sfx.exe 4820 efthfxj.exe 4188 efthfxj.exe 592 efthfxj.exe 1628 efthfxj.exe 3316 efthfxj.exe 4352 efthfxj.exe 552 efthfxj.exe 5104 efthfxj.exe 4892 efthfxj.exe 3020 efthfxj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 4820 set thread context of 4188 4820 efthfxj.exe 94 PID 4820 set thread context of 592 4820 efthfxj.exe 95 PID 4820 set thread context of 1628 4820 efthfxj.exe 97 PID 4820 set thread context of 3316 4820 efthfxj.exe 98 PID 4352 set thread context of 552 4352 efthfxj.exe 106 PID 4352 set thread context of 5104 4352 efthfxj.exe 107 PID 4352 set thread context of 4892 4352 efthfxj.exe 108 PID 4352 set thread context of 3020 4352 efthfxj.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2652 3316 WerFault.exe 98 3852 4188 WerFault.exe 94 1060 3020 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efthfxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efthfxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efthfxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efthfxj.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efthfxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efthfxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efthfxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efthfxj.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3548 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe 1628 efthfxj.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4820 efthfxj.exe Token: SeDebugPrivilege 4352 efthfxj.exe Token: SeDebugPrivilege 1628 efthfxj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4636 4856 a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895.exe 87 PID 4856 wrote to memory of 4636 4856 a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895.exe 87 PID 4856 wrote to memory of 4636 4856 a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895.exe 87 PID 4636 wrote to memory of 4540 4636 cmd.exe 90 PID 4636 wrote to memory of 4540 4636 cmd.exe 90 PID 4636 wrote to memory of 4540 4636 cmd.exe 90 PID 4540 wrote to memory of 4820 4540 efthfxj.sfx.exe 91 PID 4540 wrote to memory of 4820 4540 efthfxj.sfx.exe 91 PID 4540 wrote to memory of 4820 4540 efthfxj.sfx.exe 91 PID 4820 wrote to memory of 4188 4820 efthfxj.exe 94 PID 4820 wrote to memory of 4188 4820 efthfxj.exe 94 PID 4820 wrote to memory of 4188 4820 efthfxj.exe 94 PID 4820 wrote to memory of 4188 4820 efthfxj.exe 94 PID 4820 wrote to memory of 4188 4820 efthfxj.exe 94 PID 4820 wrote to memory of 4188 4820 efthfxj.exe 94 PID 4820 wrote to memory of 4188 4820 efthfxj.exe 94 PID 4820 wrote to memory of 4188 4820 efthfxj.exe 94 PID 4820 wrote to memory of 592 4820 efthfxj.exe 95 PID 4820 wrote to memory of 592 4820 efthfxj.exe 95 PID 4820 wrote to memory of 592 4820 efthfxj.exe 95 PID 4820 wrote to memory of 592 4820 efthfxj.exe 95 PID 4820 wrote to memory of 592 4820 efthfxj.exe 95 PID 4820 wrote to memory of 592 4820 efthfxj.exe 95 PID 4820 wrote to memory of 592 4820 efthfxj.exe 95 PID 4820 wrote to memory of 592 4820 efthfxj.exe 95 PID 4820 wrote to memory of 1628 4820 efthfxj.exe 97 PID 4820 wrote to memory of 1628 4820 efthfxj.exe 97 PID 4820 wrote to memory of 1628 4820 efthfxj.exe 97 PID 4820 wrote to memory of 1628 4820 efthfxj.exe 97 PID 4820 wrote to memory of 1628 4820 efthfxj.exe 97 PID 4820 wrote to memory of 1628 4820 efthfxj.exe 97 PID 4820 wrote to memory of 1628 4820 efthfxj.exe 97 PID 4820 wrote to memory of 1628 4820 efthfxj.exe 97 PID 4820 wrote to memory of 3316 4820 efthfxj.exe 98 PID 4820 wrote to memory of 3316 4820 efthfxj.exe 98 PID 4820 wrote to memory of 3316 4820 efthfxj.exe 98 PID 4820 wrote to memory of 3316 4820 efthfxj.exe 98 PID 4820 wrote to memory of 3316 4820 efthfxj.exe 98 PID 4820 wrote to memory of 3316 4820 efthfxj.exe 98 PID 4820 wrote to memory of 3316 4820 efthfxj.exe 98 PID 4820 wrote to memory of 3316 4820 efthfxj.exe 98 PID 592 wrote to memory of 4352 592 efthfxj.exe 101 PID 592 wrote to memory of 4352 592 efthfxj.exe 101 PID 592 wrote to memory of 4352 592 efthfxj.exe 101 PID 4352 wrote to memory of 552 4352 efthfxj.exe 106 PID 4352 wrote to memory of 552 4352 efthfxj.exe 106 PID 4352 wrote to memory of 552 4352 efthfxj.exe 106 PID 4352 wrote to memory of 552 4352 efthfxj.exe 106 PID 4352 wrote to memory of 552 4352 efthfxj.exe 106 PID 4352 wrote to memory of 552 4352 efthfxj.exe 106 PID 4352 wrote to memory of 552 4352 efthfxj.exe 106 PID 4352 wrote to memory of 552 4352 efthfxj.exe 106 PID 4352 wrote to memory of 5104 4352 efthfxj.exe 107 PID 4352 wrote to memory of 5104 4352 efthfxj.exe 107 PID 4352 wrote to memory of 5104 4352 efthfxj.exe 107 PID 4352 wrote to memory of 5104 4352 efthfxj.exe 107 PID 4352 wrote to memory of 5104 4352 efthfxj.exe 107 PID 4352 wrote to memory of 5104 4352 efthfxj.exe 107 PID 4352 wrote to memory of 5104 4352 efthfxj.exe 107 PID 4352 wrote to memory of 5104 4352 efthfxj.exe 107 PID 4352 wrote to memory of 4892 4352 efthfxj.exe 108 PID 4352 wrote to memory of 4892 4352 efthfxj.exe 108 PID 4352 wrote to memory of 4892 4352 efthfxj.exe 108 PID 4352 wrote to memory of 4892 4352 efthfxj.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895.exe"C:\Users\Admin\AppData\Local\Temp\a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\eystsdf.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Roaming\efthfxj.sfx.exeefthfxj.sfx.exe -pgtrfdewscbsdyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeG -dC:\Users\Admin\AppData\Roaming3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Roaming\efthfxj.exe"C:\Users\Admin\AppData\Roaming\efthfxj.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Roaming\efthfxj.exeC:\Users\Admin\AppData\Roaming\efthfxj.exe5⤵
- Executes dropped EXE
PID:4188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 806⤵
- Program crash
PID:3852
-
-
-
C:\Users\Admin\AppData\Roaming\efthfxj.exeC:\Users\Admin\AppData\Roaming\efthfxj.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exe"C:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exeC:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:552
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exeC:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exeC:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4892
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exeC:\Users\Admin\AppData\Roaming\XenoManager\efthfxj.exe7⤵
- Executes dropped EXE
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 808⤵
- Program crash
PID:1060
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\efthfxj.exeC:\Users\Admin\AppData\Roaming\efthfxj.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD099.tmp" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3548
-
-
-
C:\Users\Admin\AppData\Roaming\efthfxj.exeC:\Users\Admin\AppData\Roaming\efthfxj.exe5⤵
- Executes dropped EXE
PID:3316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 806⤵
- Program crash
PID:2652
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4188 -ip 41881⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3316 -ip 33161⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3020 -ip 30201⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD58334a471a4b492ece225b471b8ad2fc8
SHA11cb24640f32d23e8f7800bd0511b7b9c3011d992
SHA2565612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169
SHA51256ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36
-
Filesize
1KB
MD51fdd5f5a596a436ee52a5e78e1b86e00
SHA148f1f5d65c920f62320965c9c2b1cc41b096b8ae
SHA256a997db9ebe7321980fbd9cff00f63967b921e4b5238280fed5725690ed10897f
SHA5123146d8721f3796399e70933e09c66bf07fbcfed9b2d7e27507514761a5e2ea9e3b95a72c813658799934bec27ddbe5b9c4239a7c3cc861a00776feda9e87a332
-
Filesize
251KB
MD5dcb591d1fc03274934709e24b502d719
SHA19d4172d007347a9aa54b48cb5a214a792ad03708
SHA256c7e67928407dc0d2fe2a61e10e2f97104986770b6ba6e59f8faa7b6fcc595028
SHA5121d6748bdd0bbfbe4d1f15dde0af015fb08814ffc3360b215d4f56844b15ae1d4b29ade922678439c3a07f1fa41da287a1054b0eb5853a761ae2fabb4b08b2800
-
Filesize
474KB
MD5642a150be5bbed12c85dff794b955c01
SHA1115de36f192e2bb10ec7c2c8bba9bf3dd639b461
SHA256ded2b1a499ba8ac097361b01b1e56bdaa67769c0b7130489af489bef58cb5dfc
SHA512d4a8249bc53bd070bfb8c0cdd703980ac4b12e0a0354a31333d7bf0af089edc1317c3005e99cdd3247b883ce72d10158e928d54664941010ee884fb4a5b1ce42
-
Filesize
18KB
MD5fa0fdc18cccb4a2fb162362848d10d73
SHA19ccab8577c310e19e1299fb7fcad538c72a36420
SHA256c3f004c34695080e75df6dccc39dae9e269eba7164aa0f95b9964078973f3736
SHA512fcce03713d22d8831cb8f792c9e367aeb4d3714ffb89f148f2b64ae32bb066f7ab0b5ea58778309a86584af8169a75bb7325ba6505567881bd330cdead222fd3