Analysis
-
max time kernel
120s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 23:04
Behavioral task
behavioral1
Sample
f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe
Resource
win7-20240903-en
General
-
Target
f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe
-
Size
45KB
-
MD5
caed2f9a1430222267c829424048a584
-
SHA1
22efb3b0d0bef8ded5920b053b3bb318eb1c2c3f
-
SHA256
f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20
-
SHA512
983a371077305af97c46f30da531e4fe88181451496956d6b6871896e858568249bad33a69905a40c7619056dd6a4d2820c1bc3f88379dfee80577b2274231ba
-
SSDEEP
768:BdhO/poiiUcjlJInxQH9Xqk5nWEZ5SbTDan0WI7CPW5h:/w+jjgnqH9XqcnW85SbTG0WIJ
Malware Config
Extracted
xenorat
syfhnuc714-20814.portmap.host
Celex_Cracked
-
delay
5000
-
install_path
temp
-
port
8080
-
startup_name
Steam_Service
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2780 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2604 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2780 2716 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 30 PID 2716 wrote to memory of 2780 2716 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 30 PID 2716 wrote to memory of 2780 2716 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 30 PID 2716 wrote to memory of 2780 2716 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 30 PID 2780 wrote to memory of 2604 2780 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 31 PID 2780 wrote to memory of 2604 2780 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 31 PID 2780 wrote to memory of 2604 2780 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 31 PID 2780 wrote to memory of 2604 2780 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe"C:\Users\Admin\AppData\Local\Temp\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Steam_Service" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9F8A.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53f79eaca94797a4e2cab6fec406ea0d6
SHA1bf76c72cbd1e06567436e1bc9e54137a6289a530
SHA25616ff13377a1a8f46b36ac2727bdba9db22fa4da445403ff0af3e029d7ce43295
SHA512bf170d67e60805156a61765ceaef41eb25449bba0ff799443b8d48e14a64fcdb4a64a818c33f70d546677e23dd69e6f13473d74c06479c40ff7ce114b170e3e4
-
\Users\Admin\AppData\Local\Temp\XenoManager\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe
Filesize45KB
MD5caed2f9a1430222267c829424048a584
SHA122efb3b0d0bef8ded5920b053b3bb318eb1c2c3f
SHA256f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20
SHA512983a371077305af97c46f30da531e4fe88181451496956d6b6871896e858568249bad33a69905a40c7619056dd6a4d2820c1bc3f88379dfee80577b2274231ba