Analysis
-
max time kernel
594s -
max time network
439s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-09-2024 08:46
Behavioral task
behavioral1
Sample
Fixer/Fixer.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Fixer/Fixer.exe
Resource
win10v2004-20240802-en
General
-
Target
Fixer/Fixer.exe
-
Size
45KB
-
MD5
5ef7344600895b2f13d5d8e44537d946
-
SHA1
bdf05e86b0c923a0c1edead40cc50819b185d4c0
-
SHA256
50866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0
-
SHA512
9563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69
-
SSDEEP
768:OdhO/poiiUcjlJInMzH9Xqk5nWEZ5SbTDadWI7CPW5h:Yw+jjgnuH9XqcnW85SbTMWI5
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
69
-
startup_name
System-33
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 968 Fixer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fixer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1240 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2508 wrote to memory of 968 2508 Fixer.exe 81 PID 2508 wrote to memory of 968 2508 Fixer.exe 81 PID 2508 wrote to memory of 968 2508 Fixer.exe 81 PID 968 wrote to memory of 1240 968 Fixer.exe 82 PID 968 wrote to memory of 1240 968 Fixer.exe 82 PID 968 wrote to memory of 1240 968 Fixer.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe"C:\Users\Admin\AppData\Local\Temp\Fixer\Fixer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Fixer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "System-33" /XML "C:\Users\Admin\AppData\Local\Temp\tmp93E3.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
1KB
MD52ab093f77a33e7004e362f78c87763a8
SHA12a4dcef9285dd583a33c1c5195cac7a37daee193
SHA2564691f336ef4ce21e9f11416ab10393a8d4760db2025cfc0bd59acc25e018e234
SHA512343b32e2048b259717e04dd98ef8900f3951ca79169947f1ed642b76965d95d517bd5a7878897aee21bd4350ac96aa1240e9d7e86e0fb53b05e28da716e95d3f
-
Filesize
45KB
MD55ef7344600895b2f13d5d8e44537d946
SHA1bdf05e86b0c923a0c1edead40cc50819b185d4c0
SHA25650866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0
SHA5129563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69