Analysis
-
max time kernel
596s -
max time network
600s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 10:15
Behavioral task
behavioral1
Sample
Testing.exe
Resource
win7-20240708-en
General
-
Target
Testing.exe
-
Size
51KB
-
MD5
9a1824ec694541ef4db6417d38529d5f
-
SHA1
f57f931fd8868997311faffe4fedb380ae743482
-
SHA256
17253d61990c1669538399938dcaf6ac523b22cbf85659aed90d6b2e4e3babac
-
SHA512
edc873d4abd82eb60836d5daad421d730760ee2822e673f1b8a66102a3bc6553956340c025126d34a09a68dc411d1f2a6230ccd2cc82c5561a33a363641f3f8a
-
SSDEEP
768:yivdjHrddilbVauou79Eo7cqtPBy6HDBSkGu2yPo+LGZYebFDauZ6RNSgNOv:LpHmVauo3xAycDj6CSYebFbAf4v
Malware Config
Extracted
xenorat
147.185.221.18
nd8912d
-
delay
5000
-
install_path
appdata
-
port
18198
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2951562807-3718269429-4208157415-1000\Control Panel\International\Geo\Nation Testing.exe -
Executes dropped EXE 1 IoCs
pid Process 1040 Testing.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Testing.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Testing.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1040 4444 Testing.exe 82 PID 4444 wrote to memory of 1040 4444 Testing.exe 82 PID 4444 wrote to memory of 1040 4444 Testing.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Testing.exe"C:\Users\Admin\AppData\Local\Temp\Testing.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Roaming\XenoManager\Testing.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Testing.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
51KB
MD59a1824ec694541ef4db6417d38529d5f
SHA1f57f931fd8868997311faffe4fedb380ae743482
SHA25617253d61990c1669538399938dcaf6ac523b22cbf85659aed90d6b2e4e3babac
SHA512edc873d4abd82eb60836d5daad421d730760ee2822e673f1b8a66102a3bc6553956340c025126d34a09a68dc411d1f2a6230ccd2cc82c5561a33a363641f3f8a