Analysis
-
max time kernel
596s -
max time network
600s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-07-2024 10:15
Behavioral task
behavioral1
Sample
Testing.exe
Resource
win7-20240708-en
General
-
Target
Testing.exe
-
Size
51KB
-
MD5
9a1824ec694541ef4db6417d38529d5f
-
SHA1
f57f931fd8868997311faffe4fedb380ae743482
-
SHA256
17253d61990c1669538399938dcaf6ac523b22cbf85659aed90d6b2e4e3babac
-
SHA512
edc873d4abd82eb60836d5daad421d730760ee2822e673f1b8a66102a3bc6553956340c025126d34a09a68dc411d1f2a6230ccd2cc82c5561a33a363641f3f8a
-
SSDEEP
768:yivdjHrddilbVauou79Eo7cqtPBy6HDBSkGu2yPo+LGZYebFDauZ6RNSgNOv:LpHmVauo3xAycDj6CSYebFbAf4v
Malware Config
Extracted
xenorat
147.185.221.18
nd8912d
-
delay
5000
-
install_path
appdata
-
port
18198
-
startup_name
nothingset
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 576 Testing.exe -
Loads dropped DLL 1 IoCs
pid Process 1540 Testing.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Testing.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Testing.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 576 1540 Testing.exe 30 PID 1540 wrote to memory of 576 1540 Testing.exe 30 PID 1540 wrote to memory of 576 1540 Testing.exe 30 PID 1540 wrote to memory of 576 1540 Testing.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Testing.exe"C:\Users\Admin\AppData\Local\Temp\Testing.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Roaming\XenoManager\Testing.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Testing.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD59a1824ec694541ef4db6417d38529d5f
SHA1f57f931fd8868997311faffe4fedb380ae743482
SHA25617253d61990c1669538399938dcaf6ac523b22cbf85659aed90d6b2e4e3babac
SHA512edc873d4abd82eb60836d5daad421d730760ee2822e673f1b8a66102a3bc6553956340c025126d34a09a68dc411d1f2a6230ccd2cc82c5561a33a363641f3f8a