Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 15:37
Behavioral task
behavioral1
Sample
Pago pendientes.doc
Resource
win7-20240708-en
General
-
Target
Pago pendientes.doc
-
Size
141KB
-
MD5
1eefd150be33d5969d86f5dd82774291
-
SHA1
383a690269b80ca756e98387d6fcb6f7b9ae6c80
-
SHA256
e62a8640510e8a72b5f5b9115b94439df31cfe186970ce831fc2ac200605dcaf
-
SHA512
692e502198fe40e08bdb58f9864051663eb661990c5f0bc2165a86d79f57f5354c5d17b45495cc1562b166222f5ecf45923a77c8310393f67884fac6f471aa5b
-
SSDEEP
1536:XuonbOonbOonbV2mW7T+Y7Tx/RvvRdvkRRFbBoW5zzyJZjgkZrcrcrcuu9AUl/nl:K1DYGoMACJOue3flR5Pq3HWn08XQYp
Malware Config
Extracted
xenorat
45.66.231.26
Uolid_rat_nd8889j
-
delay
60000
-
install_path
appdata
-
port
1356
-
startup_name
ace
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2584 ITFRNLR.exe 1524 ITFRNLR.exe 2804 ITFRNLR.exe 1136 ITFRNLR.exe -
Loads dropped DLL 5 IoCs
pid Process 292 WINWORD.EXE 292 WINWORD.EXE 292 WINWORD.EXE 292 WINWORD.EXE 1524 ITFRNLR.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2584 set thread context of 1524 2584 ITFRNLR.exe 33 PID 2804 set thread context of 1136 2804 ITFRNLR.exe 35 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITFRNLR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITFRNLR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITFRNLR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITFRNLR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1852 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 292 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2584 ITFRNLR.exe Token: SeDebugPrivilege 2804 ITFRNLR.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 292 WINWORD.EXE 292 WINWORD.EXE -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 292 wrote to memory of 2584 292 WINWORD.EXE 31 PID 292 wrote to memory of 2584 292 WINWORD.EXE 31 PID 292 wrote to memory of 2584 292 WINWORD.EXE 31 PID 292 wrote to memory of 2584 292 WINWORD.EXE 31 PID 2584 wrote to memory of 1524 2584 ITFRNLR.exe 33 PID 2584 wrote to memory of 1524 2584 ITFRNLR.exe 33 PID 2584 wrote to memory of 1524 2584 ITFRNLR.exe 33 PID 2584 wrote to memory of 1524 2584 ITFRNLR.exe 33 PID 2584 wrote to memory of 1524 2584 ITFRNLR.exe 33 PID 2584 wrote to memory of 1524 2584 ITFRNLR.exe 33 PID 2584 wrote to memory of 1524 2584 ITFRNLR.exe 33 PID 2584 wrote to memory of 1524 2584 ITFRNLR.exe 33 PID 2584 wrote to memory of 1524 2584 ITFRNLR.exe 33 PID 1524 wrote to memory of 2804 1524 ITFRNLR.exe 34 PID 1524 wrote to memory of 2804 1524 ITFRNLR.exe 34 PID 1524 wrote to memory of 2804 1524 ITFRNLR.exe 34 PID 1524 wrote to memory of 2804 1524 ITFRNLR.exe 34 PID 2804 wrote to memory of 1136 2804 ITFRNLR.exe 35 PID 2804 wrote to memory of 1136 2804 ITFRNLR.exe 35 PID 2804 wrote to memory of 1136 2804 ITFRNLR.exe 35 PID 2804 wrote to memory of 1136 2804 ITFRNLR.exe 35 PID 2804 wrote to memory of 1136 2804 ITFRNLR.exe 35 PID 2804 wrote to memory of 1136 2804 ITFRNLR.exe 35 PID 2804 wrote to memory of 1136 2804 ITFRNLR.exe 35 PID 2804 wrote to memory of 1136 2804 ITFRNLR.exe 35 PID 2804 wrote to memory of 1136 2804 ITFRNLR.exe 35 PID 292 wrote to memory of 2096 292 WINWORD.EXE 36 PID 292 wrote to memory of 2096 292 WINWORD.EXE 36 PID 292 wrote to memory of 2096 292 WINWORD.EXE 36 PID 292 wrote to memory of 2096 292 WINWORD.EXE 36 PID 1136 wrote to memory of 1852 1136 ITFRNLR.exe 38 PID 1136 wrote to memory of 1852 1136 ITFRNLR.exe 38 PID 1136 wrote to memory of 1852 1136 ITFRNLR.exe 38 PID 1136 wrote to memory of 1852 1136 ITFRNLR.exe 38
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Pago pendientes.doc"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\ITFRNLR.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\ITFRNLR.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\ITFRNLR.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\ITFRNLR.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Roaming\XenoManager\ITFRNLR.exe"C:\Users\Admin\AppData\Roaming\XenoManager\ITFRNLR.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\XenoManager\ITFRNLR.exeC:\Users\Admin\AppData\Roaming\XenoManager\ITFRNLR.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "ace" /XML "C:\Users\Admin\AppData\Local\Temp\tmp902F.tmp" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1852
-
-
-
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53f970d25e06b82ceb5656273c8a22c5c
SHA12b2f4d8780566d3da449b0e63a078b8e26b5d37b
SHA25670c19e560bf003514b8c2a6c2ec16c597b6e19a8f2436cd515b9d79fae59d95b
SHA512e70a1140e26e16f93d4f2a74e3e0e70fdcc32b8f834e0255acc91842528af299e6a08c2477b16e512c975cc346d04aa617b78556738434ce016e4d8a8a83e1c1
-
Filesize
19KB
MD57e0117bb3fb201915e09e7561cd37ec5
SHA1dd9bac4039f35b10a82173939dfffecfcbb9f8aa
SHA2566b942d487e461e99d284af3ea1660f0b75399d9b606e553874a6b31d3e717ef1
SHA512f7fe9443a90b6c74aff03f0348dbfa975dce2c74cf304f89518dd1ef7090fb3adb2128ed7dce62931795dc406f6559fb18302aa1eecc98b239bcd1d8c20b0647
-
Filesize
354KB
MD53badedb0adc943d55394c06b6e43e2c8
SHA17f6d929b560edf98f3256970ec09358510ef4441
SHA256276874edc2fa8fab8faad76b95f323b6e01bea7a058053c4ea674adfc51c59ed
SHA5129daed3c7ab544e90f82ea9c303c94f7967d80450d23d7582060d46996ef00b688db407f09a7d1c582801439e7f0f65a4149019b9c46959861e519761cde2634c