Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
Odeme Eylul.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Odeme Eylul.exe
Resource
win10v2004-20240802-en
General
-
Target
Odeme Eylul.exe
-
Size
349KB
-
MD5
9202eafd948a7c76d895cf64a4c29266
-
SHA1
01cf5b9553d08d8255f2e125e9a6272e8b40b7a7
-
SHA256
90174afec8bf53b5718abdb2495257926f083cec0d4b90f7d2f7dda29ccbe256
-
SHA512
47e7bb6b613c8f1c358108c7e1447b950109fb6fb0dbf5cadc457f628ad5bdce5874da1ca9fc8a51432c79798c03d869189145725d688500ff009f826a839512
-
SSDEEP
6144:QocMkAI/pFPeX8yP2jYddBTnETaxzO7KIU4ctjccYnaXYI:JkAEFeXZP2jgTwTFa4ctjccYnaXF
Malware Config
Extracted
xenorat
154.216.17.155
Xeno_rat_nd8912d
-
delay
50000
-
install_path
appdata
-
port
1356
-
startup_name
csvr
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2764 Odeme Eylul.exe 2616 Odeme Eylul.exe 1660 Odeme Eylul.exe -
Loads dropped DLL 3 IoCs
pid Process 2816 Odeme Eylul.exe 2764 Odeme Eylul.exe 2764 Odeme Eylul.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2224 set thread context of 2680 2224 Odeme Eylul.exe 30 PID 2224 set thread context of 2816 2224 Odeme Eylul.exe 31 PID 2764 set thread context of 2616 2764 Odeme Eylul.exe 33 PID 2764 set thread context of 1660 2764 Odeme Eylul.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odeme Eylul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odeme Eylul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odeme Eylul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odeme Eylul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odeme Eylul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odeme Eylul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1616 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2224 Odeme Eylul.exe Token: SeDebugPrivilege 2764 Odeme Eylul.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2680 2224 Odeme Eylul.exe 30 PID 2224 wrote to memory of 2680 2224 Odeme Eylul.exe 30 PID 2224 wrote to memory of 2680 2224 Odeme Eylul.exe 30 PID 2224 wrote to memory of 2680 2224 Odeme Eylul.exe 30 PID 2224 wrote to memory of 2680 2224 Odeme Eylul.exe 30 PID 2224 wrote to memory of 2680 2224 Odeme Eylul.exe 30 PID 2224 wrote to memory of 2680 2224 Odeme Eylul.exe 30 PID 2224 wrote to memory of 2680 2224 Odeme Eylul.exe 30 PID 2224 wrote to memory of 2680 2224 Odeme Eylul.exe 30 PID 2224 wrote to memory of 2816 2224 Odeme Eylul.exe 31 PID 2224 wrote to memory of 2816 2224 Odeme Eylul.exe 31 PID 2224 wrote to memory of 2816 2224 Odeme Eylul.exe 31 PID 2224 wrote to memory of 2816 2224 Odeme Eylul.exe 31 PID 2224 wrote to memory of 2816 2224 Odeme Eylul.exe 31 PID 2224 wrote to memory of 2816 2224 Odeme Eylul.exe 31 PID 2224 wrote to memory of 2816 2224 Odeme Eylul.exe 31 PID 2224 wrote to memory of 2816 2224 Odeme Eylul.exe 31 PID 2224 wrote to memory of 2816 2224 Odeme Eylul.exe 31 PID 2816 wrote to memory of 2764 2816 Odeme Eylul.exe 32 PID 2816 wrote to memory of 2764 2816 Odeme Eylul.exe 32 PID 2816 wrote to memory of 2764 2816 Odeme Eylul.exe 32 PID 2816 wrote to memory of 2764 2816 Odeme Eylul.exe 32 PID 2764 wrote to memory of 2616 2764 Odeme Eylul.exe 33 PID 2764 wrote to memory of 2616 2764 Odeme Eylul.exe 33 PID 2764 wrote to memory of 2616 2764 Odeme Eylul.exe 33 PID 2764 wrote to memory of 2616 2764 Odeme Eylul.exe 33 PID 2764 wrote to memory of 2616 2764 Odeme Eylul.exe 33 PID 2764 wrote to memory of 2616 2764 Odeme Eylul.exe 33 PID 2764 wrote to memory of 2616 2764 Odeme Eylul.exe 33 PID 2764 wrote to memory of 2616 2764 Odeme Eylul.exe 33 PID 2764 wrote to memory of 2616 2764 Odeme Eylul.exe 33 PID 2764 wrote to memory of 1660 2764 Odeme Eylul.exe 34 PID 2764 wrote to memory of 1660 2764 Odeme Eylul.exe 34 PID 2764 wrote to memory of 1660 2764 Odeme Eylul.exe 34 PID 2764 wrote to memory of 1660 2764 Odeme Eylul.exe 34 PID 2764 wrote to memory of 1660 2764 Odeme Eylul.exe 34 PID 2764 wrote to memory of 1660 2764 Odeme Eylul.exe 34 PID 2764 wrote to memory of 1660 2764 Odeme Eylul.exe 34 PID 2764 wrote to memory of 1660 2764 Odeme Eylul.exe 34 PID 2764 wrote to memory of 1660 2764 Odeme Eylul.exe 34 PID 2680 wrote to memory of 1616 2680 Odeme Eylul.exe 35 PID 2680 wrote to memory of 1616 2680 Odeme Eylul.exe 35 PID 2680 wrote to memory of 1616 2680 Odeme Eylul.exe 35 PID 2680 wrote to memory of 1616 2680 Odeme Eylul.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Odeme Eylul.exe"C:\Users\Admin\AppData\Local\Temp\Odeme Eylul.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Odeme Eylul.exe"C:\Users\Admin\AppData\Local\Temp\Odeme Eylul.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "csvr" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB490.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Odeme Eylul.exe"C:\Users\Admin\AppData\Local\Temp\Odeme Eylul.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\XenoManager\Odeme Eylul.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Odeme Eylul.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\XenoManager\Odeme Eylul.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Odeme Eylul.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\Odeme Eylul.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Odeme Eylul.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c7c6897ba74966cd4cd90161547df755
SHA194324b8327e3c086389c15f99402c3b86e5d2880
SHA2569a235e59892693f581c7e0cf51117c4d9ed7bf4d978fc644e82cf2dfd4751825
SHA5123210b436e86ad7409a9a0ec50c5a68e041e0a8c352c02b732c3d15f9a9834f6578a9397ece1efa3ab56a450c3a4155fcd92291d6edf700a5d1731a6bb4dc01bb
-
Filesize
349KB
MD59202eafd948a7c76d895cf64a4c29266
SHA101cf5b9553d08d8255f2e125e9a6272e8b40b7a7
SHA25690174afec8bf53b5718abdb2495257926f083cec0d4b90f7d2f7dda29ccbe256
SHA51247e7bb6b613c8f1c358108c7e1447b950109fb6fb0dbf5cadc457f628ad5bdce5874da1ca9fc8a51432c79798c03d869189145725d688500ff009f826a839512