Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 01:01
Behavioral task
behavioral1
Sample
034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe
Resource
win7-20240729-en
General
-
Target
034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe
-
Size
45KB
-
MD5
bd2152f40dc99ec6dae3bc14b6929bdb
-
SHA1
32f787e0c931fa31dae7de1ad21edbca57d31866
-
SHA256
034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1
-
SHA512
62d8a97c16d74ca8aae86afd103004b93f5f9aeb5e54380820005576ea22ca304977d80e82971e1af860c6881326d3c5991fda3587e8bd39c6c888e7b3ea5a8e
-
SSDEEP
768:edhO/poiiUcjlJIniFH9Xqk5nWEZ5SbTDakWI7CPW5V:ow+jjgnSH9XqcnW85SbT1WId
Malware Config
Extracted
xenorat
2.58.85.196
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
2323
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3952 wrote to memory of 2740 3952 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe 87 PID 3952 wrote to memory of 2740 3952 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe 87 PID 3952 wrote to memory of 2740 3952 034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe"C:\Users\Admin\AppData\Local\Temp\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Roaming\XenoManager\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe"C:\Users\Admin\AppData\Roaming\XenoManager\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
C:\Users\Admin\AppData\Roaming\XenoManager\034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1.exe
Filesize45KB
MD5bd2152f40dc99ec6dae3bc14b6929bdb
SHA132f787e0c931fa31dae7de1ad21edbca57d31866
SHA256034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1
SHA51262d8a97c16d74ca8aae86afd103004b93f5f9aeb5e54380820005576ea22ca304977d80e82971e1af860c6881326d3c5991fda3587e8bd39c6c888e7b3ea5a8e