Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 17:03
Static task
static1
Behavioral task
behavioral1
Sample
cd18fdfb3c1421f183e3b7ae865ffe3a0c19042ff4e7d8c12d89e9b70ecfa836.exe
Resource
win7-20240705-en
General
-
Target
cd18fdfb3c1421f183e3b7ae865ffe3a0c19042ff4e7d8c12d89e9b70ecfa836.exe
-
Size
573KB
-
MD5
8a387c8c25a0ca29efc0f12f192c5976
-
SHA1
b162424169f9c04ff0558f1eaffab4ebed29d48f
-
SHA256
cd18fdfb3c1421f183e3b7ae865ffe3a0c19042ff4e7d8c12d89e9b70ecfa836
-
SHA512
c7107faca72db4518d61f0f7636bbe4c8664f383c0463d5a9b3cd26d771c16b04df0e27f3097c13b4ddfa8e62369bc9ab3bd8a2db05a665e9974af7e2229fb05
-
SSDEEP
12288:xyveQB/fTHIGaPkKEYzURNAwbAgB2X+t471zcJIKn6Ac2EwciZb:xuDXTIGaPhEYzUzA0/071zVKn6Ac2VcG
Malware Config
Extracted
xenorat
10.0.2.15
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4782
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation cd18fdfb3c1421f183e3b7ae865ffe3a0c19042ff4e7d8c12d89e9b70ecfa836.exe -
Executes dropped EXE 1 IoCs
pid Process 4276 virus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4452 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2256 wrote to memory of 4276 2256 cd18fdfb3c1421f183e3b7ae865ffe3a0c19042ff4e7d8c12d89e9b70ecfa836.exe 92 PID 2256 wrote to memory of 4276 2256 cd18fdfb3c1421f183e3b7ae865ffe3a0c19042ff4e7d8c12d89e9b70ecfa836.exe 92 PID 2256 wrote to memory of 4276 2256 cd18fdfb3c1421f183e3b7ae865ffe3a0c19042ff4e7d8c12d89e9b70ecfa836.exe 92 PID 4276 wrote to memory of 4452 4276 virus.exe 96 PID 4276 wrote to memory of 4452 4276 virus.exe 96 PID 4276 wrote to memory of 4452 4276 virus.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd18fdfb3c1421f183e3b7ae865ffe3a0c19042ff4e7d8c12d89e9b70ecfa836.exe"C:\Users\Admin\AppData\Local\Temp\cd18fdfb3c1421f183e3b7ae865ffe3a0c19042ff4e7d8c12d89e9b70ecfa836.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\virus.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\virus.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9819.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD52bca448db0f71bdebfd84ee460f3e039
SHA107a0da591539378548ce33c984ff0d24d1b2d506
SHA2567dcf92b76f2b38cfa1df2db1905135622927e75b8268943757463f1f6e056b5b
SHA512aa34ccecf9968ba802dc2d779437df5470b9d699adc0c2cc578cecc2f6db24ca18f4add1420d89af71927a36d7d574303ef6faa40c305f703047ad449396a691
-
Filesize
1KB
MD52ccacadadaf0dbea284928607f51884b
SHA1b9aba32e05d0cdbd6f8f5cd54bbda7811bae4223
SHA256c6a564b32b176329e69d1ee34b1470de81098db9aad86d966eb1efa3a2bea4d4
SHA51236bd8ecf1f157c60ef3d317ebd98b4ffe000d4120f9a23b00b081945be27cfb0f68bd4b15af0b15e590294a27e6168b7e0063c3d773aeda35b6e15ed1b493f85