Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
submitted
24-08-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
2B6F6836DB46F93418FADFDB93672FE5.exe
Resource
win7-20240704-en
General
-
Target
2B6F6836DB46F93418FADFDB93672FE5.exe
-
Size
2.6MB
-
MD5
2b6f6836db46f93418fadfdb93672fe5
-
SHA1
27337907aa2d151ca7f8588ee9b6892e53585bb0
-
SHA256
15b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7
-
SHA512
b76bbd1f84474d0e975bb1a202c85805d9e3e4f402da6c97917b6e782356ec91f7dcefc8c482c1f92208646c42383dc5fdc716b54fc40b06f10913b57ddc863a
-
SSDEEP
49152:MrQubkKYX4y96FhuD1qeMqlcnN2T2VVtxCmnmX8uSUwaHFyy:MrONB96fuhXMqiGQVtxHnLuSdal
Malware Config
Extracted
xenorat
178.214.236.32
Signatures
-
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 1992 2B6F6836DB46F93418FADFDB93672FE5.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 2B6F6836DB46F93418FADFDB93672FE5.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2336 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\control\nls\language 2B6F6836DB46F93418FADFDB93672FE5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2B6F6836DB46F93418FADFDB93672FE5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B6F6836DB46F93418FADFDB93672FE5.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 2B6F6836DB46F93418FADFDB93672FE5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2336 2B6F6836DB46F93418FADFDB93672FE5.exe 1992 2B6F6836DB46F93418FADFDB93672FE5.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1992 2336 2B6F6836DB46F93418FADFDB93672FE5.exe 30 PID 2336 wrote to memory of 1992 2336 2B6F6836DB46F93418FADFDB93672FE5.exe 30 PID 2336 wrote to memory of 1992 2336 2B6F6836DB46F93418FADFDB93672FE5.exe 30 PID 2336 wrote to memory of 1992 2336 2B6F6836DB46F93418FADFDB93672FE5.exe 30 PID 2336 wrote to memory of 1992 2336 2B6F6836DB46F93418FADFDB93672FE5.exe 30 PID 2336 wrote to memory of 1992 2336 2B6F6836DB46F93418FADFDB93672FE5.exe 30 PID 2336 wrote to memory of 1992 2336 2B6F6836DB46F93418FADFDB93672FE5.exe 30 PID 1992 wrote to memory of 2756 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 31 PID 1992 wrote to memory of 2756 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 31 PID 1992 wrote to memory of 2756 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 31 PID 1992 wrote to memory of 2756 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 31 PID 1992 wrote to memory of 2756 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 31 PID 1992 wrote to memory of 2756 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 31 PID 1992 wrote to memory of 2756 1992 2B6F6836DB46F93418FADFDB93672FE5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2B6F6836DB46F93418FADFDB93672FE5.exe"C:\Users\Admin\AppData\Local\Temp\2B6F6836DB46F93418FADFDB93672FE5.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\XenoManager\2B6F6836DB46F93418FADFDB93672FE5.exe"C:\Users\Admin\AppData\Roaming\XenoManager\2B6F6836DB46F93418FADFDB93672FE5.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Хост-процесс для задач Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB83A.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f1581a1641927490994e1aeee0ba39d1
SHA122099dd95c96cd495c79cb503d238188ff82ffc8
SHA256d6d32139141e5b1a93064bd1e1311d53af2ff9dba2a28a4108e4b46dcd1f5e12
SHA51243d13ab52fff7cff1e45b561fd1f19f0f1d3149f723e1e8e3d5963261d52029113f21499d7c72282e67772bcfa4e39829e2b1728a69be87ef7222ef93800a31a
-
Filesize
2.6MB
MD52b6f6836db46f93418fadfdb93672fe5
SHA127337907aa2d151ca7f8588ee9b6892e53585bb0
SHA25615b7a9a420c80d9e2609f3933a23b233ddb6b3a0a6d0f28a92a20d2016f36cd7
SHA512b76bbd1f84474d0e975bb1a202c85805d9e3e4f402da6c97917b6e782356ec91f7dcefc8c482c1f92208646c42383dc5fdc716b54fc40b06f10913b57ddc863a