Analysis
-
max time kernel
103s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 05:53
Behavioral task
behavioral1
Sample
9319a7b02879066d144b9f84f5b9e4c0N.exe
Resource
win7-20240705-en
General
-
Target
9319a7b02879066d144b9f84f5b9e4c0N.exe
-
Size
45KB
-
MD5
9319a7b02879066d144b9f84f5b9e4c0
-
SHA1
0634823bf3a1eecb8089634963617e7e484ec45f
-
SHA256
a9dc5a36a49131fc5c0e0f64eda0f9c00266cf2359aa5689b5dfc7bb74579c69
-
SHA512
0dad848ba0dc0daf1af8830ad7d54e121c71cf133a83195293ef51a6f02bab2e6fbe27e9b215136f8ceff909c7f54a31d4710bc7d60b4b5b543b67fbdef90bb5
-
SSDEEP
768:xdhO/poiiUcjlJInJtUH9Xqk5nWEZ5SbTDaHKWI7CPW5g:vw+jjgn/UH9XqcnW85SbTDWIo
Malware Config
Extracted
xenorat
5.226.137.239
Xt_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
aruba
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 9319a7b02879066d144b9f84f5b9e4c0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4136 9319a7b02879066d144b9f84f5b9e4c0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9319a7b02879066d144b9f84f5b9e4c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9319a7b02879066d144b9f84f5b9e4c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4916 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2652 wrote to memory of 4136 2652 9319a7b02879066d144b9f84f5b9e4c0N.exe 85 PID 2652 wrote to memory of 4136 2652 9319a7b02879066d144b9f84f5b9e4c0N.exe 85 PID 2652 wrote to memory of 4136 2652 9319a7b02879066d144b9f84f5b9e4c0N.exe 85 PID 4136 wrote to memory of 4916 4136 9319a7b02879066d144b9f84f5b9e4c0N.exe 92 PID 4136 wrote to memory of 4916 4136 9319a7b02879066d144b9f84f5b9e4c0N.exe 92 PID 4136 wrote to memory of 4916 4136 9319a7b02879066d144b9f84f5b9e4c0N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\9319a7b02879066d144b9f84f5b9e4c0N.exe"C:\Users\Admin\AppData\Local\Temp\9319a7b02879066d144b9f84f5b9e4c0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\XenoManager\9319a7b02879066d144b9f84f5b9e4c0N.exe"C:\Users\Admin\AppData\Roaming\XenoManager\9319a7b02879066d144b9f84f5b9e4c0N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "aruba" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8899.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9319a7b02879066d144b9f84f5b9e4c0N.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD54c8ec96e592952261c03dbbd61746a32
SHA10def8d9e97ecb1cc9d98bf59c6ffd87b215552fa
SHA25673537c92c46bd86785c330a1396f641cd8d4dbecba671a452c5bce8c0f559f36
SHA5120d8803416e8c8dfaa5b81dc85dd0d7dd1069ef6802fabf6098a0a817116c6f375ed470cb04c53cd103bc3588c808c89d1db20ff3b5fe1a2d2c11e1a6aedf0b1b
-
Filesize
45KB
MD59319a7b02879066d144b9f84f5b9e4c0
SHA10634823bf3a1eecb8089634963617e7e484ec45f
SHA256a9dc5a36a49131fc5c0e0f64eda0f9c00266cf2359aa5689b5dfc7bb74579c69
SHA5120dad848ba0dc0daf1af8830ad7d54e121c71cf133a83195293ef51a6f02bab2e6fbe27e9b215136f8ceff909c7f54a31d4710bc7d60b4b5b543b67fbdef90bb5