Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 09:38
Behavioral task
behavioral1
Sample
fun.exe
Resource
win7-20240708-en
General
-
Target
fun.exe
-
Size
45KB
-
MD5
826b01e057aae796faab768d38a77e28
-
SHA1
49a9ba71484951f992cc40380b008a14a702968c
-
SHA256
5d8bc8984c81225d7a5f9f7831f2eee9cc69223413f3c06da9ee5192d3121337
-
SHA512
dcb89f962445c6a32c1760fb37cf981500e0c4cbf785f511ed2ddcdaf86b2e3c45467e5dde073d3dc8b6ffa66ba809f195d04c98cfb6fbd73e4fc54f21ab565d
-
SSDEEP
768:FdhO/poiiUcjlJIntVH9Xqk5nWEZ5SbTDaiuI7CPW5y:bw+jjgnbH9XqcnW85SbTfuI6
Malware Config
Extracted
xenorat
93.133.249.30
fadspkakpsd
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
fun.exe
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation fun.exe -
Executes dropped EXE 1 IoCs
pid Process 5032 fun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3688 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2668 wrote to memory of 5032 2668 fun.exe 87 PID 2668 wrote to memory of 5032 2668 fun.exe 87 PID 2668 wrote to memory of 5032 2668 fun.exe 87 PID 5032 wrote to memory of 3688 5032 fun.exe 92 PID 5032 wrote to memory of 3688 5032 fun.exe 92 PID 5032 wrote to memory of 3688 5032 fun.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fun.exe"C:\Users\Admin\AppData\Local\Temp\fun.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\XenoManager\fun.exe"C:\Users\Admin\AppData\Roaming\XenoManager\fun.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "fun.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFCEE.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f777efba12c06529422b90443c1d5a02
SHA1979500f39a901c74458e8130b549ef522e929ccb
SHA256adb5fd113c810a07ab2b021bfd6fb3a3153ba034196a4f931512372cf5448862
SHA51262df9390b2170ab862a32f5ca73b5cf10eb56dfd42438a55a96aecb3e1811e5a71643321f98703d7eda2aa8655012c624a1a3c9d9f8127093f2c9f6937b02a11
-
Filesize
45KB
MD5826b01e057aae796faab768d38a77e28
SHA149a9ba71484951f992cc40380b008a14a702968c
SHA2565d8bc8984c81225d7a5f9f7831f2eee9cc69223413f3c06da9ee5192d3121337
SHA512dcb89f962445c6a32c1760fb37cf981500e0c4cbf785f511ed2ddcdaf86b2e3c45467e5dde073d3dc8b6ffa66ba809f195d04c98cfb6fbd73e4fc54f21ab565d