Analysis
-
max time kernel
52s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 08:37
General
-
Target
New folder/Fixer.exe
-
Size
45KB
-
MD5
5ef7344600895b2f13d5d8e44537d946
-
SHA1
bdf05e86b0c923a0c1edead40cc50819b185d4c0
-
SHA256
50866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0
-
SHA512
9563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69
-
SSDEEP
768:OdhO/poiiUcjlJInMzH9Xqk5nWEZ5SbTDadWI7CPW5h:Yw+jjgnuH9XqcnW85SbTMWI5
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
69
-
startup_name
System-33
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Fixer.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 Fixer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4820 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4284 wrote to memory of 3000 4284 Fixer.exe 85 PID 4284 wrote to memory of 3000 4284 Fixer.exe 85 PID 4284 wrote to memory of 3000 4284 Fixer.exe 85 PID 3000 wrote to memory of 4820 3000 Fixer.exe 87 PID 3000 wrote to memory of 4820 3000 Fixer.exe 87 PID 3000 wrote to memory of 4820 3000 Fixer.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\New folder\Fixer.exe"C:\Users\Admin\AppData\Local\Temp\New folder\Fixer.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "System-33" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBE5E.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4820
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52ab093f77a33e7004e362f78c87763a8
SHA12a4dcef9285dd583a33c1c5195cac7a37daee193
SHA2564691f336ef4ce21e9f11416ab10393a8d4760db2025cfc0bd59acc25e018e234
SHA512343b32e2048b259717e04dd98ef8900f3951ca79169947f1ed642b76965d95d517bd5a7878897aee21bd4350ac96aa1240e9d7e86e0fb53b05e28da716e95d3f
-
Filesize
45KB
MD55ef7344600895b2f13d5d8e44537d946
SHA1bdf05e86b0c923a0c1edead40cc50819b185d4c0
SHA25650866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0
SHA5129563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69