Analysis
-
max time kernel
594s -
max time network
424s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 08:47
Behavioral task
behavioral1
Sample
Fixer/Fixer.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Fixer/Fixer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Fixer/Fixer.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Fixer/Fixer.exe
Resource
macos-20240711.1-en
General
-
Target
Fixer/Fixer.exe
-
Size
45KB
-
MD5
5ef7344600895b2f13d5d8e44537d946
-
SHA1
bdf05e86b0c923a0c1edead40cc50819b185d4c0
-
SHA256
50866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0
-
SHA512
9563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69
-
SSDEEP
768:OdhO/poiiUcjlJInMzH9Xqk5nWEZ5SbTDadWI7CPW5h:Yw+jjgnuH9XqcnW85SbTMWI5
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
69
-
startup_name
System-33
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Fixer.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 Fixer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 712 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3288 wrote to memory of 2196 3288 Fixer.exe 85 PID 3288 wrote to memory of 2196 3288 Fixer.exe 85 PID 3288 wrote to memory of 2196 3288 Fixer.exe 85 PID 2196 wrote to memory of 712 2196 Fixer.exe 87 PID 2196 wrote to memory of 712 2196 Fixer.exe 87 PID 2196 wrote to memory of 712 2196 Fixer.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe"C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "System-33" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA633.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD52ab093f77a33e7004e362f78c87763a8
SHA12a4dcef9285dd583a33c1c5195cac7a37daee193
SHA2564691f336ef4ce21e9f11416ab10393a8d4760db2025cfc0bd59acc25e018e234
SHA512343b32e2048b259717e04dd98ef8900f3951ca79169947f1ed642b76965d95d517bd5a7878897aee21bd4350ac96aa1240e9d7e86e0fb53b05e28da716e95d3f
-
Filesize
45KB
MD55ef7344600895b2f13d5d8e44537d946
SHA1bdf05e86b0c923a0c1edead40cc50819b185d4c0
SHA25650866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0
SHA5129563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69