Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 23:19
Behavioral task
behavioral1
Sample
MemReduct/Memreduction22222.exe
Resource
win7-20240708-en
General
-
Target
MemReduct/Memreduction22222.exe
-
Size
45KB
-
MD5
ce1ea642a77b4bf6cbf7e8d74e800710
-
SHA1
afc6aae1d0c3aacdc7a75d6cee41a47c38a4fc14
-
SHA256
e82280dc7853b182380424e45b3494da52b00dbe80637a96614ebd23a5d06cc4
-
SHA512
b2f258c3fd14ee0166d0f420df879e4dbf0375aac91162c9948fafe7fb5bbd901b955bcf7f70fcf2b53b809b4df28f88b214065c62ed1e2b486315c8f4fdb7ae
-
SSDEEP
768:IdhO/poiiUcjlJIns3EH9Xqk5nWEZ5SbTDaauI7CPW5e:6w+jjgn+EH9XqcnW85SbT/uI2
Malware Config
Extracted
xenorat
127.0.0.1
Celex
-
delay
5000
-
install_path
appdata
-
port
8080
-
startup_name
Steam_service
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 Memreduction22222.exe -
Loads dropped DLL 1 IoCs
pid Process 2160 Memreduction22222.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Memreduction22222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Memreduction22222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2904 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2820 2160 Memreduction22222.exe 30 PID 2160 wrote to memory of 2820 2160 Memreduction22222.exe 30 PID 2160 wrote to memory of 2820 2160 Memreduction22222.exe 30 PID 2160 wrote to memory of 2820 2160 Memreduction22222.exe 30 PID 2820 wrote to memory of 2904 2820 Memreduction22222.exe 31 PID 2820 wrote to memory of 2904 2820 Memreduction22222.exe 31 PID 2820 wrote to memory of 2904 2820 Memreduction22222.exe 31 PID 2820 wrote to memory of 2904 2820 Memreduction22222.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\MemReduct\Memreduction22222.exe"C:\Users\Admin\AppData\Local\Temp\MemReduct\Memreduction22222.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\XenoManager\Memreduction22222.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Memreduction22222.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Steam_service" /XML "C:\Users\Admin\AppData\Local\Temp\tmp780D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD512a53938027cb86df0425cff9dd3040d
SHA1e3c7aceee9ff0f623fac534d1ffd5bc9e73598e1
SHA256e6b10b58165e00395126e6c12f2c47fd5886d8228ce21a06d7ec3bbec77e140d
SHA512504c0e3bfac15684a818b434b93425e73a57c147ec259ea2d85bbfca6db171cb03983bbd95a1a54d067d611289d3892ac661ec48aee8610d15a9ded323d961b2
-
Filesize
45KB
MD5ce1ea642a77b4bf6cbf7e8d74e800710
SHA1afc6aae1d0c3aacdc7a75d6cee41a47c38a4fc14
SHA256e82280dc7853b182380424e45b3494da52b00dbe80637a96614ebd23a5d06cc4
SHA512b2f258c3fd14ee0166d0f420df879e4dbf0375aac91162c9948fafe7fb5bbd901b955bcf7f70fcf2b53b809b4df28f88b214065c62ed1e2b486315c8f4fdb7ae