Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 06:29
Behavioral task
behavioral1
Sample
TransAgenda.exe
Resource
win7-20240704-en
General
-
Target
TransAgenda.exe
-
Size
127KB
-
MD5
8dbebef8a47ea96ceed4408641e195ce
-
SHA1
b13a236bdf60de5fac38ab11344392eadb7462a9
-
SHA256
2bee910afaec59b55af87e2056a52cc43d879a2582dc5d148bcf696ddbd0516d
-
SHA512
9159cf5a19963d73d947cf17db303eb84353a0237b03bb61fc553b6945f3c670da79cc5185211a793effa191ef438f0ce3f1b894dde3983cc068adce0757540d
-
SSDEEP
3072:9w+jqT91UbTkTxswif42DRk1u1F33bIWQD4agDUbjwAGy7:qW291UbuqfhdkY1F3rTQD4agwfwby
Malware Config
Extracted
xenorat
174.60.140.164
Xeno_rat_nd8912f
-
delay
5000
-
install_path
appdata
-
port
7707
-
startup_name
TransAgenda
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation TransAgenda.exe -
Executes dropped EXE 1 IoCs
pid Process 1004 TransAgenda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TransAgenda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TransAgenda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1740 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1004 2840 TransAgenda.exe 86 PID 2840 wrote to memory of 1004 2840 TransAgenda.exe 86 PID 2840 wrote to memory of 1004 2840 TransAgenda.exe 86 PID 1004 wrote to memory of 1740 1004 TransAgenda.exe 92 PID 1004 wrote to memory of 1740 1004 TransAgenda.exe 92 PID 1004 wrote to memory of 1740 1004 TransAgenda.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\TransAgenda.exe"C:\Users\Admin\AppData\Local\Temp\TransAgenda.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\XenoManager\TransAgenda.exe"C:\Users\Admin\AppData\Roaming\XenoManager\TransAgenda.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "TransAgenda" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8889.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5a9c1f7e3003f94a8c0313a0dc0724247
SHA1c175bfbdeed865347102f9f709808ab69ef558f5
SHA2568847403fa9782db190ff467a63a6d84af09ad173a4fed107a9b11aee0cf26e26
SHA512fc86570456b8d7f1f01c5f8580ace3c627e7368640c704471787831bd58829ce99ee7f0a6cfea601f9038602e4988f769a16e4016790af76431d6ccb54983b37
-
Filesize
127KB
MD58dbebef8a47ea96ceed4408641e195ce
SHA1b13a236bdf60de5fac38ab11344392eadb7462a9
SHA2562bee910afaec59b55af87e2056a52cc43d879a2582dc5d148bcf696ddbd0516d
SHA5129159cf5a19963d73d947cf17db303eb84353a0237b03bb61fc553b6945f3c670da79cc5185211a793effa191ef438f0ce3f1b894dde3983cc068adce0757540d