Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe
Resource
win7-20240708-en
General
-
Target
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe
-
Size
367KB
-
MD5
3b28af41d6afa46a8e9b5707e3bfb8f7
-
SHA1
421755f9c95e2c7140241859983ad8665cf67b41
-
SHA256
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707
-
SHA512
ddd508da739baacbd05c63b86dc0df4b6b74b416a332e967e8cddf16f1fec5b28ee2cf2a0c82b4ddc7e3fb11040bc15d13330cf73cfce9020cba4d605ceb1729
-
SSDEEP
6144:H0ths4dDpxQCc6nxbx5S9l2VFqNK8xpDSznNkBJn64nJl0lvzewww0JwwgSnvYq:HKs45p2sxKP2VSKIoznSv64nJl0lvz3t
Malware Config
Extracted
xenorat
45.66.231.63
Tolid_rat_nd8889j
-
delay
40000
-
install_path
temp
-
port
1353
-
startup_name
vplayer
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Control Panel\International\Geo\Nation f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Executes dropped EXE 4 IoCs
pid Process 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 3888 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 3816 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 2332 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4440 set thread context of 2536 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 4440 set thread context of 1820 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 4440 set thread context of 740 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1600 set thread context of 3888 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 1600 set thread context of 3816 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1600 set thread context of 2332 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1852 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Token: SeDebugPrivilege 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2536 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 4440 wrote to memory of 2536 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 4440 wrote to memory of 2536 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 4440 wrote to memory of 2536 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 4440 wrote to memory of 2536 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 4440 wrote to memory of 2536 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 4440 wrote to memory of 2536 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 4440 wrote to memory of 2536 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 4440 wrote to memory of 1820 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 4440 wrote to memory of 1820 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 4440 wrote to memory of 1820 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 4440 wrote to memory of 1820 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 4440 wrote to memory of 1820 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 4440 wrote to memory of 1820 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 4440 wrote to memory of 1820 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 4440 wrote to memory of 1820 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 4440 wrote to memory of 740 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 4440 wrote to memory of 740 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 4440 wrote to memory of 740 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 4440 wrote to memory of 740 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 4440 wrote to memory of 740 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 4440 wrote to memory of 740 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 4440 wrote to memory of 740 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 4440 wrote to memory of 740 4440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1820 wrote to memory of 1600 1820 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 89 PID 1820 wrote to memory of 1600 1820 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 89 PID 1820 wrote to memory of 1600 1820 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 89 PID 1600 wrote to memory of 3888 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 1600 wrote to memory of 3888 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 1600 wrote to memory of 3888 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 1600 wrote to memory of 3888 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 1600 wrote to memory of 3888 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 1600 wrote to memory of 3888 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 1600 wrote to memory of 3888 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 1600 wrote to memory of 3888 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 1600 wrote to memory of 3816 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1600 wrote to memory of 3816 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1600 wrote to memory of 3816 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1600 wrote to memory of 3816 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1600 wrote to memory of 3816 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1600 wrote to memory of 3816 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1600 wrote to memory of 3816 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1600 wrote to memory of 3816 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 1600 wrote to memory of 2332 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 1600 wrote to memory of 2332 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 1600 wrote to memory of 2332 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 1600 wrote to memory of 2332 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 1600 wrote to memory of 2332 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 1600 wrote to memory of 2332 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 1600 wrote to memory of 2332 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 1600 wrote to memory of 2332 1600 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 92 PID 2536 wrote to memory of 1852 2536 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 96 PID 2536 wrote to memory of 1852 2536 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 96 PID 2536 wrote to memory of 1852 2536 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "vplayer" /XML "C:\Users\Admin\AppData\Local\Temp\tmp870D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1852
-
-
-
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe2⤵
- System Location Discovery: System Language Discovery
PID:740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe.log
Filesize522B
MD58334a471a4b492ece225b471b8ad2fc8
SHA11cb24640f32d23e8f7800bd0511b7b9c3011d992
SHA2565612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169
SHA51256ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe
Filesize367KB
MD53b28af41d6afa46a8e9b5707e3bfb8f7
SHA1421755f9c95e2c7140241859983ad8665cf67b41
SHA256f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707
SHA512ddd508da739baacbd05c63b86dc0df4b6b74b416a332e967e8cddf16f1fec5b28ee2cf2a0c82b4ddc7e3fb11040bc15d13330cf73cfce9020cba4d605ceb1729
-
Filesize
1KB
MD5a38219bf1c995060e7f1a621a829608c
SHA104689e15a01f40aef9ad766c1dc22527ee40ebe7
SHA2562122bdb74bb5d63bce6ca627c845c1415845808beb910d0c9ce706495ec0d07a
SHA5122c98956d7da969cac19ed4824b9f548397328df006d649be8089345f7e36fe6f69e82082f50ead0651f89f8ec6c4f422d5b156d025be3c5a2d1963376c2eb6e0