Analysis
-
max time kernel
142s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 02:58
Behavioral task
behavioral1
Sample
cnidc.exe
Resource
win7-20240704-en
General
-
Target
cnidc.exe
-
Size
45KB
-
MD5
80988e2faaee97ee38873d13914e2c68
-
SHA1
cd2465aeeff61d78974f66ebce023cb294d95116
-
SHA256
97cfaaa4661e1fc410fc150bc0b03ae35a64558afe7c83a2435ad0724cbace14
-
SHA512
ed45da0660f1c72ea5fa7452030adc9c77459df681ac2c3d3410fa444c8aea4c43e2399281f6156d90d7f3b31e1b007f39ad6137d607ae37ceb7b5d5b423956b
-
SSDEEP
768:SdhO/poiiUcjlJInglH9Xqk5nWEZ5SbTDacWI7CPW5h:0w+jjgnQH9XqcnW85SbTVWI5
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
hi
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2300 cnidc.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 cnidc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnidc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnidc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1256 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2300 2240 cnidc.exe 28 PID 2240 wrote to memory of 2300 2240 cnidc.exe 28 PID 2240 wrote to memory of 2300 2240 cnidc.exe 28 PID 2240 wrote to memory of 2300 2240 cnidc.exe 28 PID 2300 wrote to memory of 1256 2300 cnidc.exe 29 PID 2300 wrote to memory of 1256 2300 cnidc.exe 29 PID 2300 wrote to memory of 1256 2300 cnidc.exe 29 PID 2300 wrote to memory of 1256 2300 cnidc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cnidc.exe"C:\Users\Admin\AppData\Local\Temp\cnidc.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\cnidc.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\cnidc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "hi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp59E3.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1256
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD551341935fdd22e880b0e8956566cb07d
SHA1c9c0115a2b59a5477d5750c1d7816342b49108b9
SHA25624949c5837ba14e03371d9a4ac98e977ee91fe81079779a5983773fd37f8141f
SHA5124e99ec4b0164b11589651804edac1c6dcddbcc394e797b2d75be061d371dd75f3823c5d73bfa0510dab9697e9b8b35a28b0a163fa2d747b9d7a43799a1fb2b42
-
Filesize
45KB
MD580988e2faaee97ee38873d13914e2c68
SHA1cd2465aeeff61d78974f66ebce023cb294d95116
SHA25697cfaaa4661e1fc410fc150bc0b03ae35a64558afe7c83a2435ad0724cbace14
SHA512ed45da0660f1c72ea5fa7452030adc9c77459df681ac2c3d3410fa444c8aea4c43e2399281f6156d90d7f3b31e1b007f39ad6137d607ae37ceb7b5d5b423956b