Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 09:38
Behavioral task
behavioral1
Sample
fun.exe
Resource
win7-20240708-en
General
-
Target
fun.exe
-
Size
45KB
-
MD5
826b01e057aae796faab768d38a77e28
-
SHA1
49a9ba71484951f992cc40380b008a14a702968c
-
SHA256
5d8bc8984c81225d7a5f9f7831f2eee9cc69223413f3c06da9ee5192d3121337
-
SHA512
dcb89f962445c6a32c1760fb37cf981500e0c4cbf785f511ed2ddcdaf86b2e3c45467e5dde073d3dc8b6ffa66ba809f195d04c98cfb6fbd73e4fc54f21ab565d
-
SSDEEP
768:FdhO/poiiUcjlJIntVH9Xqk5nWEZ5SbTDaiuI7CPW5y:bw+jjgnbH9XqcnW85SbTfuI6
Malware Config
Extracted
xenorat
93.133.249.30
fadspkakpsd
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
fun.exe
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2812 fun.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 fun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2848 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2812 2208 fun.exe 30 PID 2208 wrote to memory of 2812 2208 fun.exe 30 PID 2208 wrote to memory of 2812 2208 fun.exe 30 PID 2208 wrote to memory of 2812 2208 fun.exe 30 PID 2812 wrote to memory of 2848 2812 fun.exe 31 PID 2812 wrote to memory of 2848 2812 fun.exe 31 PID 2812 wrote to memory of 2848 2812 fun.exe 31 PID 2812 wrote to memory of 2848 2812 fun.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fun.exe"C:\Users\Admin\AppData\Local\Temp\fun.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\XenoManager\fun.exe"C:\Users\Admin\AppData\Roaming\XenoManager\fun.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "fun.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9195.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f777efba12c06529422b90443c1d5a02
SHA1979500f39a901c74458e8130b549ef522e929ccb
SHA256adb5fd113c810a07ab2b021bfd6fb3a3153ba034196a4f931512372cf5448862
SHA51262df9390b2170ab862a32f5ca73b5cf10eb56dfd42438a55a96aecb3e1811e5a71643321f98703d7eda2aa8655012c624a1a3c9d9f8127093f2c9f6937b02a11
-
Filesize
45KB
MD5826b01e057aae796faab768d38a77e28
SHA149a9ba71484951f992cc40380b008a14a702968c
SHA2565d8bc8984c81225d7a5f9f7831f2eee9cc69223413f3c06da9ee5192d3121337
SHA512dcb89f962445c6a32c1760fb37cf981500e0c4cbf785f511ed2ddcdaf86b2e3c45467e5dde073d3dc8b6ffa66ba809f195d04c98cfb6fbd73e4fc54f21ab565d