Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 00:08
Behavioral task
behavioral1
Sample
Spoofer By Runtz (CRACKED).exe
Resource
win7-20240903-en
General
-
Target
Spoofer By Runtz (CRACKED).exe
-
Size
45KB
-
MD5
722eb89eb60b302bc2e07bc5fe73455a
-
SHA1
5af9d5b2ad0891e86170bad7e29f15fb0089ff97
-
SHA256
7dad8bde1930921c2dd4b769af27b5aa9b3889688ac7270d5807187335d2fcc4
-
SHA512
fe8ac25aee120c929614068a8315e4646572fd4d9ba0be55fef3ec59413b1a0d2a45016f357b699fba436f05ffa951cab2ed3c80ff7c666125f100da849d2a6b
-
SSDEEP
768:xdhO/poiiUcjlJInxQH9Xqk5nWEZ5SbTDan0WI7CPW5Z:vw+jjgnqH9XqcnW85SbTG0WIx
Malware Config
Extracted
xenorat
syfhnuc714-20814.portmap.host
Celex_Cracked
-
delay
5000
-
install_path
temp
-
port
8080
-
startup_name
Steam_Service
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Spoofer By Runtz (CRACKED).exe -
Executes dropped EXE 1 IoCs
pid Process 1048 Spoofer By Runtz (CRACKED).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spoofer By Runtz (CRACKED).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spoofer By Runtz (CRACKED).exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4856 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1048 1372 Spoofer By Runtz (CRACKED).exe 86 PID 1372 wrote to memory of 1048 1372 Spoofer By Runtz (CRACKED).exe 86 PID 1372 wrote to memory of 1048 1372 Spoofer By Runtz (CRACKED).exe 86 PID 1048 wrote to memory of 4856 1048 Spoofer By Runtz (CRACKED).exe 91 PID 1048 wrote to memory of 4856 1048 Spoofer By Runtz (CRACKED).exe 91 PID 1048 wrote to memory of 4856 1048 Spoofer By Runtz (CRACKED).exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spoofer By Runtz (CRACKED).exe"C:\Users\Admin\AppData\Local\Temp\Spoofer By Runtz (CRACKED).exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Spoofer By Runtz (CRACKED).exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Spoofer By Runtz (CRACKED).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Steam_Service" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD169.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD5722eb89eb60b302bc2e07bc5fe73455a
SHA15af9d5b2ad0891e86170bad7e29f15fb0089ff97
SHA2567dad8bde1930921c2dd4b769af27b5aa9b3889688ac7270d5807187335d2fcc4
SHA512fe8ac25aee120c929614068a8315e4646572fd4d9ba0be55fef3ec59413b1a0d2a45016f357b699fba436f05ffa951cab2ed3c80ff7c666125f100da849d2a6b
-
Filesize
1KB
MD522afe6eb6dfc8761fc89d9e648844dc5
SHA19ab18b9ad6e1fd2512c5aaee8d54cfc0884d1082
SHA25674636be3f882e9cee04e4635a24b3929a527109a88f19cc05e986bbbc1d37210
SHA512dec6ee6ec78de45e11f94d45af819ba97317145e5030953ecf1298e166dcb0d847ad4cf2ff79b713064513d2f61104db8282b90ec96f657be1297480458f0702