Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe
Resource
win7-20240729-en
General
-
Target
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe
-
Size
367KB
-
MD5
3b28af41d6afa46a8e9b5707e3bfb8f7
-
SHA1
421755f9c95e2c7140241859983ad8665cf67b41
-
SHA256
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707
-
SHA512
ddd508da739baacbd05c63b86dc0df4b6b74b416a332e967e8cddf16f1fec5b28ee2cf2a0c82b4ddc7e3fb11040bc15d13330cf73cfce9020cba4d605ceb1729
-
SSDEEP
6144:H0ths4dDpxQCc6nxbx5S9l2VFqNK8xpDSznNkBJn64nJl0lvzewww0JwwgSnvYq:HKs45p2sxKP2VSKIoznSv64nJl0lvz3t
Malware Config
Extracted
xenorat
45.66.231.63
Tolid_rat_nd8889j
-
delay
40000
-
install_path
temp
-
port
1353
-
startup_name
vplayer
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-113082768-653872390-2867000172-1000\Control Panel\International\Geo\Nation f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Executes dropped EXE 4 IoCs
pid Process 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 808 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 2712 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 768 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1628 set thread context of 1440 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 1628 set thread context of 1236 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1628 set thread context of 1848 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 4448 set thread context of 808 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 4448 set thread context of 2712 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 4448 set thread context of 768 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3560 808 WerFault.exe 90 3708 2712 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2384 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe Token: SeDebugPrivilege 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1440 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 1628 wrote to memory of 1440 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 1628 wrote to memory of 1440 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 1628 wrote to memory of 1440 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 1628 wrote to memory of 1440 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 1628 wrote to memory of 1440 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 1628 wrote to memory of 1440 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 1628 wrote to memory of 1440 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 86 PID 1628 wrote to memory of 1236 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1628 wrote to memory of 1236 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1628 wrote to memory of 1236 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1628 wrote to memory of 1236 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1628 wrote to memory of 1236 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1628 wrote to memory of 1236 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1628 wrote to memory of 1236 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1628 wrote to memory of 1236 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 87 PID 1628 wrote to memory of 1848 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1628 wrote to memory of 1848 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1628 wrote to memory of 1848 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1628 wrote to memory of 1848 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1628 wrote to memory of 1848 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1628 wrote to memory of 1848 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1628 wrote to memory of 1848 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1628 wrote to memory of 1848 1628 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 88 PID 1236 wrote to memory of 4448 1236 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 89 PID 1236 wrote to memory of 4448 1236 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 89 PID 1236 wrote to memory of 4448 1236 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 89 PID 4448 wrote to memory of 808 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 4448 wrote to memory of 808 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 4448 wrote to memory of 808 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 4448 wrote to memory of 808 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 4448 wrote to memory of 808 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 4448 wrote to memory of 808 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 4448 wrote to memory of 808 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 4448 wrote to memory of 808 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 90 PID 4448 wrote to memory of 2712 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 4448 wrote to memory of 2712 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 4448 wrote to memory of 2712 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 4448 wrote to memory of 2712 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 4448 wrote to memory of 2712 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 4448 wrote to memory of 2712 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 4448 wrote to memory of 2712 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 4448 wrote to memory of 2712 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 91 PID 4448 wrote to memory of 768 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 93 PID 4448 wrote to memory of 768 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 93 PID 4448 wrote to memory of 768 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 93 PID 4448 wrote to memory of 768 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 93 PID 4448 wrote to memory of 768 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 93 PID 4448 wrote to memory of 768 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 93 PID 4448 wrote to memory of 768 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 93 PID 4448 wrote to memory of 768 4448 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 93 PID 1440 wrote to memory of 2384 1440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 102 PID 1440 wrote to memory of 2384 1440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 102 PID 1440 wrote to memory of 2384 1440 f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "vplayer" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5BF6.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe4⤵
- Executes dropped EXE
PID:808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 805⤵
- Program crash
PID:3560
-
-
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe4⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 805⤵
- Program crash
PID:3708
-
-
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exeC:\Users\Admin\AppData\Local\Temp\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe2⤵
- System Location Discovery: System Language Discovery
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 808 -ip 8081⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 2712 -ip 27121⤵PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe.log
Filesize522B
MD58334a471a4b492ece225b471b8ad2fc8
SHA11cb24640f32d23e8f7800bd0511b7b9c3011d992
SHA2565612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169
SHA51256ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707.exe
Filesize367KB
MD53b28af41d6afa46a8e9b5707e3bfb8f7
SHA1421755f9c95e2c7140241859983ad8665cf67b41
SHA256f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707
SHA512ddd508da739baacbd05c63b86dc0df4b6b74b416a332e967e8cddf16f1fec5b28ee2cf2a0c82b4ddc7e3fb11040bc15d13330cf73cfce9020cba4d605ceb1729
-
Filesize
1KB
MD5a38219bf1c995060e7f1a621a829608c
SHA104689e15a01f40aef9ad766c1dc22527ee40ebe7
SHA2562122bdb74bb5d63bce6ca627c845c1415845808beb910d0c9ce706495ec0d07a
SHA5122c98956d7da969cac19ed4824b9f548397328df006d649be8089345f7e36fe6f69e82082f50ead0651f89f8ec6c4f422d5b156d025be3c5a2d1963376c2eb6e0