Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe
Resource
win7-20240729-en
General
-
Target
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe
-
Size
367KB
-
MD5
3b28af41d6afa46a8e9b5707e3bfb8f7
-
SHA1
421755f9c95e2c7140241859983ad8665cf67b41
-
SHA256
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707
-
SHA512
ddd508da739baacbd05c63b86dc0df4b6b74b416a332e967e8cddf16f1fec5b28ee2cf2a0c82b4ddc7e3fb11040bc15d13330cf73cfce9020cba4d605ceb1729
-
SSDEEP
6144:H0ths4dDpxQCc6nxbx5S9l2VFqNK8xpDSznNkBJn64nJl0lvzewww0JwwgSnvYq:HKs45p2sxKP2VSKIoznSv64nJl0lvz3t
Malware Config
Extracted
xenorat
45.66.231.63
Tolid_rat_nd8889j
-
delay
40000
-
install_path
temp
-
port
1353
-
startup_name
vplayer
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Control Panel\International\Geo\Nation f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Executes dropped EXE 4 IoCs
pid Process 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 4464 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 3252 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 2340 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2816 set thread context of 1976 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 85 PID 2816 set thread context of 3372 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 2816 set thread context of 1212 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 2012 set thread context of 4464 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2012 set thread context of 3252 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 94 PID 2012 set thread context of 2340 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4516 1976 WerFault.exe 85 4424 4464 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4364 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Token: SeDebugPrivilege 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2816 wrote to memory of 1976 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 85 PID 2816 wrote to memory of 1976 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 85 PID 2816 wrote to memory of 1976 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 85 PID 2816 wrote to memory of 1976 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 85 PID 2816 wrote to memory of 1976 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 85 PID 2816 wrote to memory of 1976 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 85 PID 2816 wrote to memory of 1976 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 85 PID 2816 wrote to memory of 1976 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 85 PID 2816 wrote to memory of 3372 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 2816 wrote to memory of 3372 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 2816 wrote to memory of 3372 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 2816 wrote to memory of 3372 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 2816 wrote to memory of 3372 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 2816 wrote to memory of 3372 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 2816 wrote to memory of 3372 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 2816 wrote to memory of 3372 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 2816 wrote to memory of 1212 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 2816 wrote to memory of 1212 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 2816 wrote to memory of 1212 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 2816 wrote to memory of 1212 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 2816 wrote to memory of 1212 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 2816 wrote to memory of 1212 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 2816 wrote to memory of 1212 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 2816 wrote to memory of 1212 2816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1212 wrote to memory of 2012 1212 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1212 wrote to memory of 2012 1212 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1212 wrote to memory of 2012 1212 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 2012 wrote to memory of 4464 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2012 wrote to memory of 4464 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2012 wrote to memory of 4464 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2012 wrote to memory of 4464 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2012 wrote to memory of 4464 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2012 wrote to memory of 4464 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2012 wrote to memory of 4464 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2012 wrote to memory of 4464 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2012 wrote to memory of 3252 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 94 PID 2012 wrote to memory of 3252 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 94 PID 2012 wrote to memory of 3252 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 94 PID 2012 wrote to memory of 3252 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 94 PID 2012 wrote to memory of 3252 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 94 PID 2012 wrote to memory of 3252 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 94 PID 2012 wrote to memory of 3252 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 94 PID 2012 wrote to memory of 3252 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 94 PID 2012 wrote to memory of 2340 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 95 PID 2012 wrote to memory of 2340 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 95 PID 2012 wrote to memory of 2340 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 95 PID 2012 wrote to memory of 2340 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 95 PID 2012 wrote to memory of 2340 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 95 PID 2012 wrote to memory of 2340 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 95 PID 2012 wrote to memory of 2340 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 95 PID 2012 wrote to memory of 2340 2012 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 95 PID 3372 wrote to memory of 4364 3372 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 98 PID 3372 wrote to memory of 4364 3372 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 98 PID 3372 wrote to memory of 4364 3372 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe2⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 803⤵
- Program crash
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "vplayer" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2BED.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe4⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 805⤵
- Program crash
PID:4424
-
-
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1976 -ip 19761⤵PID:1028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4464 -ip 44641⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe.log
Filesize522B
MD58334a471a4b492ece225b471b8ad2fc8
SHA11cb24640f32d23e8f7800bd0511b7b9c3011d992
SHA2565612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169
SHA51256ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe
Filesize367KB
MD53b28af41d6afa46a8e9b5707e3bfb8f7
SHA1421755f9c95e2c7140241859983ad8665cf67b41
SHA256f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707
SHA512ddd508da739baacbd05c63b86dc0df4b6b74b416a332e967e8cddf16f1fec5b28ee2cf2a0c82b4ddc7e3fb11040bc15d13330cf73cfce9020cba4d605ceb1729
-
Filesize
1KB
MD5a38219bf1c995060e7f1a621a829608c
SHA104689e15a01f40aef9ad766c1dc22527ee40ebe7
SHA2562122bdb74bb5d63bce6ca627c845c1415845808beb910d0c9ce706495ec0d07a
SHA5122c98956d7da969cac19ed4824b9f548397328df006d649be8089345f7e36fe6f69e82082f50ead0651f89f8ec6c4f422d5b156d025be3c5a2d1963376c2eb6e0