Analysis
-
max time kernel
599s -
max time network
386s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-09-2024 08:47
Behavioral task
behavioral1
Sample
Fixer/Fixer.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Fixer/Fixer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Fixer/Fixer.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Fixer/Fixer.exe
Resource
macos-20240711.1-en
General
-
Target
Fixer/Fixer.exe
-
Size
45KB
-
MD5
5ef7344600895b2f13d5d8e44537d946
-
SHA1
bdf05e86b0c923a0c1edead40cc50819b185d4c0
-
SHA256
50866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0
-
SHA512
9563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69
-
SSDEEP
768:OdhO/poiiUcjlJInMzH9Xqk5nWEZ5SbTDadWI7CPW5h:Yw+jjgnuH9XqcnW85SbTMWI5
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
69
-
startup_name
System-33
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1272 Fixer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 596 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1272 1452 Fixer.exe 72 PID 1452 wrote to memory of 1272 1452 Fixer.exe 72 PID 1452 wrote to memory of 1272 1452 Fixer.exe 72 PID 1272 wrote to memory of 596 1272 Fixer.exe 73 PID 1272 wrote to memory of 596 1272 Fixer.exe 73 PID 1272 wrote to memory of 596 1272 Fixer.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe"C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "System-33" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5D81.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52ab093f77a33e7004e362f78c87763a8
SHA12a4dcef9285dd583a33c1c5195cac7a37daee193
SHA2564691f336ef4ce21e9f11416ab10393a8d4760db2025cfc0bd59acc25e018e234
SHA512343b32e2048b259717e04dd98ef8900f3951ca79169947f1ed642b76965d95d517bd5a7878897aee21bd4350ac96aa1240e9d7e86e0fb53b05e28da716e95d3f
-
Filesize
45KB
MD55ef7344600895b2f13d5d8e44537d946
SHA1bdf05e86b0c923a0c1edead40cc50819b185d4c0
SHA25650866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0
SHA5129563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69