Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 15:13
Behavioral task
behavioral1
Sample
works (i thimk).exe
Resource
win7-20240704-en
General
-
Target
works (i thimk).exe
-
Size
46KB
-
MD5
63b36e568577473bb71a7b54f56e8ec2
-
SHA1
7a36dc6d73687d3e8df8b02abeeaf52b7075e33d
-
SHA256
0a4869f2b7d46eda43c07a1986f8cccecc36b42bf5587b146f6f6a5f119b2bb5
-
SHA512
9c41f09037d56b7143596526a26d0a0fd5d45f0d2b1e31e56950a35ef494b60eaf0941cb0e0e485228216aba2fe0accf295988fcc20d664fe9b1bbb20e223305
-
SSDEEP
768:jdhO/poiiUcjlJInljsZ8H9Xqk5nWEZ5SbTDaBuI7CPW57:xw+jjgn1sZ8H9XqcnW85SbTkuID
Malware Config
Extracted
xenorat
communication-sig.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
3038
-
startup_name
Java Updater
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation works (i thimk).exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation works (i thimk).exe -
Executes dropped EXE 1 IoCs
pid Process 2520 works (i thimk).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language works (i thimk).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language works (i thimk).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 4556 taskmgr.exe 4556 taskmgr.exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 4556 taskmgr.exe 4556 taskmgr.exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 4556 taskmgr.exe 4556 taskmgr.exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 4556 taskmgr.exe 4556 taskmgr.exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 4556 taskmgr.exe 4556 taskmgr.exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 4556 taskmgr.exe 4556 taskmgr.exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 4556 taskmgr.exe 4556 taskmgr.exe 2520 works (i thimk).exe 2520 works (i thimk).exe 2520 works (i thimk).exe 4556 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4556 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2520 works (i thimk).exe Token: SeDebugPrivilege 4556 taskmgr.exe Token: SeSystemProfilePrivilege 4556 taskmgr.exe Token: SeCreateGlobalPrivilege 4556 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2520 2120 works (i thimk).exe 86 PID 2120 wrote to memory of 2520 2120 works (i thimk).exe 86 PID 2120 wrote to memory of 2520 2120 works (i thimk).exe 86 PID 2520 wrote to memory of 4500 2520 works (i thimk).exe 93 PID 2520 wrote to memory of 4500 2520 works (i thimk).exe 93 PID 2520 wrote to memory of 4500 2520 works (i thimk).exe 93 PID 2520 wrote to memory of 1864 2520 works (i thimk).exe 110 PID 2520 wrote to memory of 1864 2520 works (i thimk).exe 110 PID 2520 wrote to memory of 1864 2520 works (i thimk).exe 110 PID 2520 wrote to memory of 904 2520 works (i thimk).exe 112 PID 2520 wrote to memory of 904 2520 works (i thimk).exe 112 PID 2520 wrote to memory of 904 2520 works (i thimk).exe 112 PID 2520 wrote to memory of 4552 2520 works (i thimk).exe 114 PID 2520 wrote to memory of 4552 2520 works (i thimk).exe 114 PID 2520 wrote to memory of 4552 2520 works (i thimk).exe 114 PID 4552 wrote to memory of 2796 4552 cmd.exe 116 PID 4552 wrote to memory of 2796 4552 cmd.exe 116 PID 4552 wrote to memory of 2796 4552 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\works (i thimk).exe"C:\Users\Admin\AppData\Local\Temp\works (i thimk).exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\works (i thimk).exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\works (i thimk).exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Java Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB49A.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4500
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query /v /fo csv3⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /delete /tn "\Java Updater" /f3⤵
- System Location Discovery: System Language Discovery
PID:904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\XenoManager\works (i thimk).exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
46KB
MD563b36e568577473bb71a7b54f56e8ec2
SHA17a36dc6d73687d3e8df8b02abeeaf52b7075e33d
SHA2560a4869f2b7d46eda43c07a1986f8cccecc36b42bf5587b146f6f6a5f119b2bb5
SHA5129c41f09037d56b7143596526a26d0a0fd5d45f0d2b1e31e56950a35ef494b60eaf0941cb0e0e485228216aba2fe0accf295988fcc20d664fe9b1bbb20e223305
-
Filesize
1KB
MD529eb753358d125c7c390bbc045159183
SHA1e4d75fddaed27d5f9c6cebb61b9a894c86537172
SHA256177305de144cf978284546c92b54d160292c5eadc50d1a60e6e5d4d335558129
SHA512f81ceaf387b4ba65cbfec795231422a6df11bc7f4a9566c68a3f5c4407283adfe1e5d3f27259f84a101460fdcd4369fe7089b88d36b2651ad5656bb4aba39820