Analysis
-
max time kernel
102s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 06:27
Behavioral task
behavioral1
Sample
84aa5512d3260fb2ab5bfb670be32b10N.exe
Resource
win7-20240729-en
General
-
Target
84aa5512d3260fb2ab5bfb670be32b10N.exe
-
Size
50KB
-
MD5
84aa5512d3260fb2ab5bfb670be32b10
-
SHA1
0edec332527e587ae47481278428e9c451a83de1
-
SHA256
ea95e26a0cc6fbc78c24a321bd38cbafb90e1b5082ea70c3d6cdd8c421914710
-
SHA512
59f51abe2eab5753a85063386f0dd14a075d18ca2840419031ca73dc786f51bbe8b56bdfdff5f87366bc0395ba72bb4a6825ad98d5046d773b08d55ae6c5c413
-
SSDEEP
768:qdhO/poiiUcjlJInvonH9Xqk5nWEZ5SbTDaBWI7CPW5ZZW:Mw+jjgnAnH9XqcnW85SbToWIRZW
Malware Config
Extracted
xenorat
192.168.1.189
Windows_Defender
-
delay
5000
-
install_path
appdata
-
port
4782
-
startup_name
WDefender
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 84aa5512d3260fb2ab5bfb670be32b10N.exe -
Executes dropped EXE 1 IoCs
pid Process 3864 84aa5512d3260fb2ab5bfb670be32b10N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84aa5512d3260fb2ab5bfb670be32b10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84aa5512d3260fb2ab5bfb670be32b10N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4476 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3804 wrote to memory of 3864 3804 84aa5512d3260fb2ab5bfb670be32b10N.exe 87 PID 3804 wrote to memory of 3864 3804 84aa5512d3260fb2ab5bfb670be32b10N.exe 87 PID 3804 wrote to memory of 3864 3804 84aa5512d3260fb2ab5bfb670be32b10N.exe 87 PID 3864 wrote to memory of 4476 3864 84aa5512d3260fb2ab5bfb670be32b10N.exe 93 PID 3864 wrote to memory of 4476 3864 84aa5512d3260fb2ab5bfb670be32b10N.exe 93 PID 3864 wrote to memory of 4476 3864 84aa5512d3260fb2ab5bfb670be32b10N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\84aa5512d3260fb2ab5bfb670be32b10N.exe"C:\Users\Admin\AppData\Local\Temp\84aa5512d3260fb2ab5bfb670be32b10N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Roaming\XenoManager\84aa5512d3260fb2ab5bfb670be32b10N.exe"C:\Users\Admin\AppData\Roaming\XenoManager\84aa5512d3260fb2ab5bfb670be32b10N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "WDefender" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB844.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\84aa5512d3260fb2ab5bfb670be32b10N.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5f22f45281691f5168b9fc5368dd217b1
SHA1f5cff1b207fd51dd0cfb32777c84edc53fe455b5
SHA25656a26f3bad9ed51c7b8b9f2ab6aeb4ec0a02f34622f3ec2fd75a235a937d5ce4
SHA5123c208463d82ee6cc90edbb65914aab617c1b614cebe4a431f327932a132abd28c31245cf84d06ac58693fb78b941bb142426249aacdc0790bf615d7c3e2fcc4c
-
Filesize
50KB
MD584aa5512d3260fb2ab5bfb670be32b10
SHA10edec332527e587ae47481278428e9c451a83de1
SHA256ea95e26a0cc6fbc78c24a321bd38cbafb90e1b5082ea70c3d6cdd8c421914710
SHA51259f51abe2eab5753a85063386f0dd14a075d18ca2840419031ca73dc786f51bbe8b56bdfdff5f87366bc0395ba72bb4a6825ad98d5046d773b08d55ae6c5c413