Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 23:04
General
-
Target
Memreduction22222.exe
-
Size
45KB
-
MD5
ce1ea642a77b4bf6cbf7e8d74e800710
-
SHA1
afc6aae1d0c3aacdc7a75d6cee41a47c38a4fc14
-
SHA256
e82280dc7853b182380424e45b3494da52b00dbe80637a96614ebd23a5d06cc4
-
SHA512
b2f258c3fd14ee0166d0f420df879e4dbf0375aac91162c9948fafe7fb5bbd901b955bcf7f70fcf2b53b809b4df28f88b214065c62ed1e2b486315c8f4fdb7ae
-
SSDEEP
768:IdhO/poiiUcjlJIns3EH9Xqk5nWEZ5SbTDaauI7CPW5e:6w+jjgn+EH9XqcnW85SbT/uI2
Malware Config
Extracted
xenorat
127.0.0.1
Celex
-
delay
5000
-
install_path
appdata
-
port
8080
-
startup_name
Steam_service
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation Memreduction22222.exe -
Executes dropped EXE 1 IoCs
pid Process 1056 Memreduction22222.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Memreduction22222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Memreduction22222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2068 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 784 wrote to memory of 1056 784 Memreduction22222.exe 85 PID 784 wrote to memory of 1056 784 Memreduction22222.exe 85 PID 784 wrote to memory of 1056 784 Memreduction22222.exe 85 PID 1056 wrote to memory of 2068 1056 Memreduction22222.exe 92 PID 1056 wrote to memory of 2068 1056 Memreduction22222.exe 92 PID 1056 wrote to memory of 2068 1056 Memreduction22222.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Memreduction22222.exe"C:\Users\Admin\AppData\Local\Temp\Memreduction22222.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Roaming\XenoManager\Memreduction22222.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Memreduction22222.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Steam_service" /XML "C:\Users\Admin\AppData\Local\Temp\tmp881C.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD512a53938027cb86df0425cff9dd3040d
SHA1e3c7aceee9ff0f623fac534d1ffd5bc9e73598e1
SHA256e6b10b58165e00395126e6c12f2c47fd5886d8228ce21a06d7ec3bbec77e140d
SHA512504c0e3bfac15684a818b434b93425e73a57c147ec259ea2d85bbfca6db171cb03983bbd95a1a54d067d611289d3892ac661ec48aee8610d15a9ded323d961b2
-
Filesize
45KB
MD5ce1ea642a77b4bf6cbf7e8d74e800710
SHA1afc6aae1d0c3aacdc7a75d6cee41a47c38a4fc14
SHA256e82280dc7853b182380424e45b3494da52b00dbe80637a96614ebd23a5d06cc4
SHA512b2f258c3fd14ee0166d0f420df879e4dbf0375aac91162c9948fafe7fb5bbd901b955bcf7f70fcf2b53b809b4df28f88b214065c62ed1e2b486315c8f4fdb7ae