Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 01:01
Behavioral task
behavioral1
Sample
034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe
Resource
win7-20240729-en
General
-
Target
034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe
-
Size
45KB
-
MD5
bd2152f40dc99ec6dae3bc14b6929bdb
-
SHA1
32f787e0c931fa31dae7de1ad21edbca57d31866
-
SHA256
034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1
-
SHA512
62d8a97c16d74ca8aae86afd103004b93f5f9aeb5e54380820005576ea22ca304977d80e82971e1af860c6881326d3c5991fda3587e8bd39c6c888e7b3ea5a8e
-
SSDEEP
768:edhO/poiiUcjlJIniFH9Xqk5nWEZ5SbTDakWI7CPW5V:ow+jjgnSH9XqcnW85SbT1WId
Malware Config
Extracted
xenorat
2.58.85.196
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
2323
-
startup_name
nothingset
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2448 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe -
Loads dropped DLL 1 IoCs
pid Process 1692 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2448 1692 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe 29 PID 1692 wrote to memory of 2448 1692 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe 29 PID 1692 wrote to memory of 2448 1692 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe 29 PID 1692 wrote to memory of 2448 1692 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe"C:\Users\Admin\AppData\Local\Temp\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\XenoManager\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe"C:\Users\Admin\AppData\Roaming\XenoManager\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\XenoManager\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe
Filesize45KB
MD5bd2152f40dc99ec6dae3bc14b6929bdb
SHA132f787e0c931fa31dae7de1ad21edbca57d31866
SHA256034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1
SHA51262d8a97c16d74ca8aae86afd103004b93f5f9aeb5e54380820005576ea22ca304977d80e82971e1af860c6881326d3c5991fda3587e8bd39c6c888e7b3ea5a8e