Resubmissions
01-08-2024 19:20
240801-x2h3tsvclr 1001-08-2024 19:20
240801-x14cdavckl 1001-08-2024 19:19
240801-x1tsyayfmd 10Analysis
-
max time kernel
598s -
max time network
438s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 19:20
General
-
Target
xero/xero.exe
-
Size
45KB
-
MD5
3b55e1134c4d41bd31da43caa2e281e3
-
SHA1
626b6f42961606a84f55529388ba5a761f773ee0
-
SHA256
a250d17fc5aedefe2b11a61a8702839cf47317dc36b88e5abeb789a019787c07
-
SHA512
efb34525c6d2216569b981fdca53e0ca5123195d5559eedffe90aec98fdea1c49734cfeb1bb4fc38b1147059be057b64180c8d71867a93739cb27bee03af722e
-
SSDEEP
768:tdhO/poiiUcjlJInDQuH9Xqk5nWEZ5SbTDaWWI7CPW57:jw+jjgnRH9XqcnW85SbTvWIj
Malware Config
Extracted
xenorat
127.0.0.1
Xero_Legit
-
delay
5000
-
install_path
appdata
-
port
5525
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-807826884-2440573969-3755798217-1000\Control Panel\International\Geo\Nation xero.exe -
Executes dropped EXE 1 IoCs
pid Process 4740 xero.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xero.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xero.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2388 wrote to memory of 4740 2388 xero.exe 86 PID 2388 wrote to memory of 4740 2388 xero.exe 86 PID 2388 wrote to memory of 4740 2388 xero.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\xero\xero.exe"C:\Users\Admin\AppData\Local\Temp\xero\xero.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\XenoManager\xero.exe"C:\Users\Admin\AppData\Roaming\XenoManager\xero.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD53b55e1134c4d41bd31da43caa2e281e3
SHA1626b6f42961606a84f55529388ba5a761f773ee0
SHA256a250d17fc5aedefe2b11a61a8702839cf47317dc36b88e5abeb789a019787c07
SHA512efb34525c6d2216569b981fdca53e0ca5123195d5559eedffe90aec98fdea1c49734cfeb1bb4fc38b1147059be057b64180c8d71867a93739cb27bee03af722e