Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 23:04
Behavioral task
behavioral1
Sample
f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe
Resource
win7-20240903-en
General
-
Target
f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe
-
Size
45KB
-
MD5
caed2f9a1430222267c829424048a584
-
SHA1
22efb3b0d0bef8ded5920b053b3bb318eb1c2c3f
-
SHA256
f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20
-
SHA512
983a371077305af97c46f30da531e4fe88181451496956d6b6871896e858568249bad33a69905a40c7619056dd6a4d2820c1bc3f88379dfee80577b2274231ba
-
SSDEEP
768:BdhO/poiiUcjlJInxQH9Xqk5nWEZ5SbTDan0WI7CPW5h:/w+jjgnqH9XqcnW85SbTG0WIJ
Malware Config
Extracted
xenorat
syfhnuc714-20814.portmap.host
Celex_Cracked
-
delay
5000
-
install_path
temp
-
port
8080
-
startup_name
Steam_Service
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe -
Executes dropped EXE 1 IoCs
pid Process 3840 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4868 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4324 wrote to memory of 3840 4324 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 86 PID 4324 wrote to memory of 3840 4324 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 86 PID 4324 wrote to memory of 3840 4324 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 86 PID 3840 wrote to memory of 4868 3840 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 91 PID 3840 wrote to memory of 4868 3840 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 91 PID 3840 wrote to memory of 4868 3840 f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe"C:\Users\Admin\AppData\Local\Temp\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Steam_Service" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9683.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20.exe
Filesize45KB
MD5caed2f9a1430222267c829424048a584
SHA122efb3b0d0bef8ded5920b053b3bb318eb1c2c3f
SHA256f000c7fb9844e917eb223f1a1a8035fc2f95df89625441e18e9666f405d72b20
SHA512983a371077305af97c46f30da531e4fe88181451496956d6b6871896e858568249bad33a69905a40c7619056dd6a4d2820c1bc3f88379dfee80577b2274231ba
-
Filesize
1KB
MD53f79eaca94797a4e2cab6fec406ea0d6
SHA1bf76c72cbd1e06567436e1bc9e54137a6289a530
SHA25616ff13377a1a8f46b36ac2727bdba9db22fa4da445403ff0af3e029d7ce43295
SHA512bf170d67e60805156a61765ceaef41eb25449bba0ff799443b8d48e14a64fcdb4a64a818c33f70d546677e23dd69e6f13473d74c06479c40ff7ce114b170e3e4