Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 14:51
Behavioral task
behavioral1
Sample
worksithimk.exe
Resource
win7-20240704-en
General
-
Target
worksithimk.exe
-
Size
46KB
-
MD5
63b36e568577473bb71a7b54f56e8ec2
-
SHA1
7a36dc6d73687d3e8df8b02abeeaf52b7075e33d
-
SHA256
0a4869f2b7d46eda43c07a1986f8cccecc36b42bf5587b146f6f6a5f119b2bb5
-
SHA512
9c41f09037d56b7143596526a26d0a0fd5d45f0d2b1e31e56950a35ef494b60eaf0941cb0e0e485228216aba2fe0accf295988fcc20d664fe9b1bbb20e223305
-
SSDEEP
768:jdhO/poiiUcjlJInljsZ8H9Xqk5nWEZ5SbTDaBuI7CPW57:xw+jjgn1sZ8H9XqcnW85SbTkuID
Malware Config
Extracted
xenorat
communication-sig.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
3038
-
startup_name
Java Updater
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2292 worksithimk.exe -
Loads dropped DLL 1 IoCs
pid Process 2476 worksithimk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language worksithimk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language worksithimk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe 2292 worksithimk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2292 worksithimk.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2292 2476 worksithimk.exe 31 PID 2476 wrote to memory of 2292 2476 worksithimk.exe 31 PID 2476 wrote to memory of 2292 2476 worksithimk.exe 31 PID 2476 wrote to memory of 2292 2476 worksithimk.exe 31 PID 2476 wrote to memory of 2292 2476 worksithimk.exe 31 PID 2476 wrote to memory of 2292 2476 worksithimk.exe 31 PID 2476 wrote to memory of 2292 2476 worksithimk.exe 31 PID 2292 wrote to memory of 2756 2292 worksithimk.exe 32 PID 2292 wrote to memory of 2756 2292 worksithimk.exe 32 PID 2292 wrote to memory of 2756 2292 worksithimk.exe 32 PID 2292 wrote to memory of 2756 2292 worksithimk.exe 32 PID 2292 wrote to memory of 2828 2292 worksithimk.exe 35 PID 2292 wrote to memory of 2828 2292 worksithimk.exe 35 PID 2292 wrote to memory of 2828 2292 worksithimk.exe 35 PID 2292 wrote to memory of 2828 2292 worksithimk.exe 35 PID 2292 wrote to memory of 2908 2292 worksithimk.exe 37 PID 2292 wrote to memory of 2908 2292 worksithimk.exe 37 PID 2292 wrote to memory of 2908 2292 worksithimk.exe 37 PID 2292 wrote to memory of 2908 2292 worksithimk.exe 37 PID 2292 wrote to memory of 1876 2292 worksithimk.exe 39 PID 2292 wrote to memory of 1876 2292 worksithimk.exe 39 PID 2292 wrote to memory of 1876 2292 worksithimk.exe 39 PID 2292 wrote to memory of 1876 2292 worksithimk.exe 39 PID 1876 wrote to memory of 1228 1876 cmd.exe 41 PID 1876 wrote to memory of 1228 1876 cmd.exe 41 PID 1876 wrote to memory of 1228 1876 cmd.exe 41 PID 1876 wrote to memory of 1228 1876 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\worksithimk.exe"C:\Users\Admin\AppData\Local\Temp\worksithimk.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\worksithimk.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\worksithimk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Java Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE521.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2756
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query /v /fo csv3⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /delete /tn "\Java Updater" /f3⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\XenoManager\worksithimk.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
- System Location Discovery: System Language Discovery
PID:1228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD563b36e568577473bb71a7b54f56e8ec2
SHA17a36dc6d73687d3e8df8b02abeeaf52b7075e33d
SHA2560a4869f2b7d46eda43c07a1986f8cccecc36b42bf5587b146f6f6a5f119b2bb5
SHA5129c41f09037d56b7143596526a26d0a0fd5d45f0d2b1e31e56950a35ef494b60eaf0941cb0e0e485228216aba2fe0accf295988fcc20d664fe9b1bbb20e223305
-
Filesize
1KB
MD5a410a81ddfb6b2667c293a6e28a35b43
SHA191c66502e6db9420c97e185650a1e1eac8781ebc
SHA2569f2d3e8420ee099022333b5ed8ed213f1f7af19403ef6b004e23435b4552cd63
SHA51256bdb835a37b933649a975b80f077917f6a41b3a209c65596c9bc538ec6cb0fadd431ed4168b4f51c737197155561768ed2274699e1b36edc8263f0b2415a492