Analysis
-
max time kernel
101s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 06:27
Behavioral task
behavioral1
Sample
84aa5512d3260fb2ab5bfb670be32b10N.exe
Resource
win7-20240729-en
General
-
Target
84aa5512d3260fb2ab5bfb670be32b10N.exe
-
Size
50KB
-
MD5
84aa5512d3260fb2ab5bfb670be32b10
-
SHA1
0edec332527e587ae47481278428e9c451a83de1
-
SHA256
ea95e26a0cc6fbc78c24a321bd38cbafb90e1b5082ea70c3d6cdd8c421914710
-
SHA512
59f51abe2eab5753a85063386f0dd14a075d18ca2840419031ca73dc786f51bbe8b56bdfdff5f87366bc0395ba72bb4a6825ad98d5046d773b08d55ae6c5c413
-
SSDEEP
768:qdhO/poiiUcjlJInvonH9Xqk5nWEZ5SbTDaBWI7CPW5ZZW:Mw+jjgnAnH9XqcnW85SbToWIRZW
Malware Config
Extracted
xenorat
192.168.1.189
Windows_Defender
-
delay
5000
-
install_path
appdata
-
port
4782
-
startup_name
WDefender
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 84aa5512d3260fb2ab5bfb670be32b10N.exe -
Loads dropped DLL 1 IoCs
pid Process 1520 84aa5512d3260fb2ab5bfb670be32b10N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84aa5512d3260fb2ab5bfb670be32b10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84aa5512d3260fb2ab5bfb670be32b10N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2788 1520 84aa5512d3260fb2ab5bfb670be32b10N.exe 30 PID 1520 wrote to memory of 2788 1520 84aa5512d3260fb2ab5bfb670be32b10N.exe 30 PID 1520 wrote to memory of 2788 1520 84aa5512d3260fb2ab5bfb670be32b10N.exe 30 PID 1520 wrote to memory of 2788 1520 84aa5512d3260fb2ab5bfb670be32b10N.exe 30 PID 2788 wrote to memory of 2804 2788 84aa5512d3260fb2ab5bfb670be32b10N.exe 31 PID 2788 wrote to memory of 2804 2788 84aa5512d3260fb2ab5bfb670be32b10N.exe 31 PID 2788 wrote to memory of 2804 2788 84aa5512d3260fb2ab5bfb670be32b10N.exe 31 PID 2788 wrote to memory of 2804 2788 84aa5512d3260fb2ab5bfb670be32b10N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\84aa5512d3260fb2ab5bfb670be32b10N.exe"C:\Users\Admin\AppData\Local\Temp\84aa5512d3260fb2ab5bfb670be32b10N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Roaming\XenoManager\84aa5512d3260fb2ab5bfb670be32b10N.exe"C:\Users\Admin\AppData\Roaming\XenoManager\84aa5512d3260fb2ab5bfb670be32b10N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "WDefender" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC986.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f22f45281691f5168b9fc5368dd217b1
SHA1f5cff1b207fd51dd0cfb32777c84edc53fe455b5
SHA25656a26f3bad9ed51c7b8b9f2ab6aeb4ec0a02f34622f3ec2fd75a235a937d5ce4
SHA5123c208463d82ee6cc90edbb65914aab617c1b614cebe4a431f327932a132abd28c31245cf84d06ac58693fb78b941bb142426249aacdc0790bf615d7c3e2fcc4c
-
Filesize
50KB
MD584aa5512d3260fb2ab5bfb670be32b10
SHA10edec332527e587ae47481278428e9c451a83de1
SHA256ea95e26a0cc6fbc78c24a321bd38cbafb90e1b5082ea70c3d6cdd8c421914710
SHA51259f51abe2eab5753a85063386f0dd14a075d18ca2840419031ca73dc786f51bbe8b56bdfdff5f87366bc0395ba72bb4a6825ad98d5046d773b08d55ae6c5c413