Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
afhvser.exe
Resource
win7-20240705-en
General
-
Target
afhvser.exe
-
Size
353KB
-
MD5
d51e11f21698000dc7834221d02d93a1
-
SHA1
d2a4196c36840b5eaabb9f585d504ebd8278840a
-
SHA256
819895f1a99faf768a9bd2e8c789d90725c2c9c3da9f446c1522907193ffe2c3
-
SHA512
c895c0c72f3b7bbb6bf88a366049aa833b775abf5fef6018f120975a4fb98e9866891a3f92cfd09267edbdd1fedc3e1e6b084239b15c4b6bf189ff2e81d61846
-
SSDEEP
6144:wAbK2Zy++MX+DvKbLPEEVna5zHQICkMUTOYoREG8gn3Hd9oZ2dHnI:5yBMuDv0atjzG8gn3Hd9oZ2NI
Malware Config
Extracted
xenorat
45.66.231.26
Uolid_rat_nd8889j
-
delay
60000
-
install_path
appdata
-
port
1356
-
startup_name
ace
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2692 afhvser.exe 2828 afhvser.exe -
Loads dropped DLL 2 IoCs
pid Process 1272 afhvser.exe 2692 afhvser.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1356 set thread context of 1272 1356 afhvser.exe 30 PID 2692 set thread context of 2828 2692 afhvser.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afhvser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afhvser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afhvser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afhvser.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2956 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1356 afhvser.exe Token: SeDebugPrivilege 2692 afhvser.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1272 1356 afhvser.exe 30 PID 1356 wrote to memory of 1272 1356 afhvser.exe 30 PID 1356 wrote to memory of 1272 1356 afhvser.exe 30 PID 1356 wrote to memory of 1272 1356 afhvser.exe 30 PID 1356 wrote to memory of 1272 1356 afhvser.exe 30 PID 1356 wrote to memory of 1272 1356 afhvser.exe 30 PID 1356 wrote to memory of 1272 1356 afhvser.exe 30 PID 1356 wrote to memory of 1272 1356 afhvser.exe 30 PID 1356 wrote to memory of 1272 1356 afhvser.exe 30 PID 1272 wrote to memory of 2692 1272 afhvser.exe 31 PID 1272 wrote to memory of 2692 1272 afhvser.exe 31 PID 1272 wrote to memory of 2692 1272 afhvser.exe 31 PID 1272 wrote to memory of 2692 1272 afhvser.exe 31 PID 2692 wrote to memory of 2828 2692 afhvser.exe 32 PID 2692 wrote to memory of 2828 2692 afhvser.exe 32 PID 2692 wrote to memory of 2828 2692 afhvser.exe 32 PID 2692 wrote to memory of 2828 2692 afhvser.exe 32 PID 2692 wrote to memory of 2828 2692 afhvser.exe 32 PID 2692 wrote to memory of 2828 2692 afhvser.exe 32 PID 2692 wrote to memory of 2828 2692 afhvser.exe 32 PID 2692 wrote to memory of 2828 2692 afhvser.exe 32 PID 2692 wrote to memory of 2828 2692 afhvser.exe 32 PID 2828 wrote to memory of 2956 2828 afhvser.exe 34 PID 2828 wrote to memory of 2956 2828 afhvser.exe 34 PID 2828 wrote to memory of 2956 2828 afhvser.exe 34 PID 2828 wrote to memory of 2956 2828 afhvser.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\afhvser.exe"C:\Users\Admin\AppData\Local\Temp\afhvser.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\afhvser.exeC:\Users\Admin\AppData\Local\Temp\afhvser.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Roaming\XenoManager\afhvser.exe"C:\Users\Admin\AppData\Roaming\XenoManager\afhvser.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\XenoManager\afhvser.exeC:\Users\Admin\AppData\Roaming\XenoManager\afhvser.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "ace" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9C6E.tmp" /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2956
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5df9b542895574a46efc01b67fead9cf0
SHA1555023d5b61d5c786d82bd9a152a1d92cf18235b
SHA2565e990e41ed6c474363adffaa8e111fa819f137f34a821fa06b2c50d286d04659
SHA512ac61c3ba5805da1b6a9edc100c68851d3d756233c7d6578cd50cf8d47d1a58c72b5497427594725973739ad2aa609475d7f20d1a06ef10768cf3109d1b8bf4c8
-
Filesize
353KB
MD5d51e11f21698000dc7834221d02d93a1
SHA1d2a4196c36840b5eaabb9f585d504ebd8278840a
SHA256819895f1a99faf768a9bd2e8c789d90725c2c9c3da9f446c1522907193ffe2c3
SHA512c895c0c72f3b7bbb6bf88a366049aa833b775abf5fef6018f120975a4fb98e9866891a3f92cfd09267edbdd1fedc3e1e6b084239b15c4b6bf189ff2e81d61846