Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 09:19
Static task
static1
Behavioral task
behavioral1
Sample
07082024_0919_dthsgs.exe
Resource
win7-20240704-en
General
-
Target
07082024_0919_dthsgs.exe
-
Size
250KB
-
MD5
8def0f85d1f18a9a6b700224c7bd9d9c
-
SHA1
1ac4779022750a9069e5f613200bcce258803b6d
-
SHA256
c7e7be05ba49a626dab92a2a2d52dbecfd77cd307b91c231a1e01793eeed86eb
-
SHA512
3614926f9af7332f35a725daf47e0042be035b3efcc668c1b36ee2a7a5d5a6bf3ea11301ce58ee5169d0e6bc74d8bd7ad910a0e44e2951fb40f25210eb00c170
-
SSDEEP
6144:Cmj4xlRcbUEZA9qYK51W31+6jWB+U7C2I:z4V2A9qYK51WpjWB+U7CL
Malware Config
Extracted
xenorat
cns.requimacofradian.site
Uolid_rat_nd8889j
-
delay
45000
-
install_path
appdata
-
port
1354
-
startup_name
vdplayer
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 07082024_0919_dthsgs.exe -
Executes dropped EXE 3 IoCs
pid Process 3384 07082024_0919_dthsgs.exe 1544 07082024_0919_dthsgs.exe 764 07082024_0919_dthsgs.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3708 set thread context of 1160 3708 07082024_0919_dthsgs.exe 86 PID 3708 set thread context of 3376 3708 07082024_0919_dthsgs.exe 87 PID 3384 set thread context of 1544 3384 07082024_0919_dthsgs.exe 89 PID 3384 set thread context of 764 3384 07082024_0919_dthsgs.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1072 1544 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07082024_0919_dthsgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07082024_0919_dthsgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07082024_0919_dthsgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07082024_0919_dthsgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07082024_0919_dthsgs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3300 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3708 07082024_0919_dthsgs.exe Token: SeDebugPrivilege 3384 07082024_0919_dthsgs.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3708 wrote to memory of 1160 3708 07082024_0919_dthsgs.exe 86 PID 3708 wrote to memory of 1160 3708 07082024_0919_dthsgs.exe 86 PID 3708 wrote to memory of 1160 3708 07082024_0919_dthsgs.exe 86 PID 3708 wrote to memory of 1160 3708 07082024_0919_dthsgs.exe 86 PID 3708 wrote to memory of 1160 3708 07082024_0919_dthsgs.exe 86 PID 3708 wrote to memory of 1160 3708 07082024_0919_dthsgs.exe 86 PID 3708 wrote to memory of 1160 3708 07082024_0919_dthsgs.exe 86 PID 3708 wrote to memory of 1160 3708 07082024_0919_dthsgs.exe 86 PID 3708 wrote to memory of 3376 3708 07082024_0919_dthsgs.exe 87 PID 3708 wrote to memory of 3376 3708 07082024_0919_dthsgs.exe 87 PID 3708 wrote to memory of 3376 3708 07082024_0919_dthsgs.exe 87 PID 3708 wrote to memory of 3376 3708 07082024_0919_dthsgs.exe 87 PID 3708 wrote to memory of 3376 3708 07082024_0919_dthsgs.exe 87 PID 3708 wrote to memory of 3376 3708 07082024_0919_dthsgs.exe 87 PID 3708 wrote to memory of 3376 3708 07082024_0919_dthsgs.exe 87 PID 3708 wrote to memory of 3376 3708 07082024_0919_dthsgs.exe 87 PID 3376 wrote to memory of 3384 3376 07082024_0919_dthsgs.exe 88 PID 3376 wrote to memory of 3384 3376 07082024_0919_dthsgs.exe 88 PID 3376 wrote to memory of 3384 3376 07082024_0919_dthsgs.exe 88 PID 3384 wrote to memory of 1544 3384 07082024_0919_dthsgs.exe 89 PID 3384 wrote to memory of 1544 3384 07082024_0919_dthsgs.exe 89 PID 3384 wrote to memory of 1544 3384 07082024_0919_dthsgs.exe 89 PID 3384 wrote to memory of 1544 3384 07082024_0919_dthsgs.exe 89 PID 3384 wrote to memory of 1544 3384 07082024_0919_dthsgs.exe 89 PID 3384 wrote to memory of 1544 3384 07082024_0919_dthsgs.exe 89 PID 3384 wrote to memory of 1544 3384 07082024_0919_dthsgs.exe 89 PID 3384 wrote to memory of 1544 3384 07082024_0919_dthsgs.exe 89 PID 3384 wrote to memory of 764 3384 07082024_0919_dthsgs.exe 90 PID 3384 wrote to memory of 764 3384 07082024_0919_dthsgs.exe 90 PID 3384 wrote to memory of 764 3384 07082024_0919_dthsgs.exe 90 PID 3384 wrote to memory of 764 3384 07082024_0919_dthsgs.exe 90 PID 3384 wrote to memory of 764 3384 07082024_0919_dthsgs.exe 90 PID 3384 wrote to memory of 764 3384 07082024_0919_dthsgs.exe 90 PID 3384 wrote to memory of 764 3384 07082024_0919_dthsgs.exe 90 PID 3384 wrote to memory of 764 3384 07082024_0919_dthsgs.exe 90 PID 1160 wrote to memory of 3300 1160 07082024_0919_dthsgs.exe 97 PID 1160 wrote to memory of 3300 1160 07082024_0919_dthsgs.exe 97 PID 1160 wrote to memory of 3300 1160 07082024_0919_dthsgs.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\07082024_0919_dthsgs.exe"C:\Users\Admin\AppData\Local\Temp\07082024_0919_dthsgs.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\07082024_0919_dthsgs.exeC:\Users\Admin\AppData\Local\Temp\07082024_0919_dthsgs.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "vdplayer" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3FA4.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3300
-
-
-
C:\Users\Admin\AppData\Local\Temp\07082024_0919_dthsgs.exeC:\Users\Admin\AppData\Local\Temp\07082024_0919_dthsgs.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Roaming\XenoManager\07082024_0919_dthsgs.exe"C:\Users\Admin\AppData\Roaming\XenoManager\07082024_0919_dthsgs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Roaming\XenoManager\07082024_0919_dthsgs.exeC:\Users\Admin\AppData\Roaming\XenoManager\07082024_0919_dthsgs.exe4⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 805⤵
- Program crash
PID:1072
-
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\07082024_0919_dthsgs.exeC:\Users\Admin\AppData\Roaming\XenoManager\07082024_0919_dthsgs.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:764
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1544 -ip 15441⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
1KB
MD5f0129baa5875a7c774ea6223f9703369
SHA16d6d5ac6165eb2d1bf25380c4bdd7b8811d1cb41
SHA256b119c63b13bc1bce68702e7ff1eebd5a10c22d274aab35848e613ec1090030ac
SHA5126a5080dc515f7885cfbe45aa215d81f04921349bc36abc8a89344f0b7652fb4b86f926f0c2e905ec8117d74547614237ea047a771a36197eab1bf9ac2a93e156
-
Filesize
250KB
MD58def0f85d1f18a9a6b700224c7bd9d9c
SHA11ac4779022750a9069e5f613200bcce258803b6d
SHA256c7e7be05ba49a626dab92a2a2d52dbecfd77cd307b91c231a1e01793eeed86eb
SHA5123614926f9af7332f35a725daf47e0042be035b3efcc668c1b36ee2a7a5d5a6bf3ea11301ce58ee5169d0e6bc74d8bd7ad910a0e44e2951fb40f25210eb00c170