Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 20:21
Behavioral task
behavioral1
Sample
Terminal.exe
Resource
win7-20240708-en
General
-
Target
Terminal.exe
-
Size
265KB
-
MD5
4ef7fab8f31fea78f9339ff1b61ff955
-
SHA1
feab88e721e59e6685d80fbbb62880679f16973c
-
SHA256
bd96ab832522b95bc01637c0aa4d2a03cb9a36c1ace05ce6c0962586d3fd645f
-
SHA512
1165dc71eab587b19c9a6b3d10c5ac513a9befd45d10719c482364f02dcd990aaf583080900fd1bd961de98b8088a4d0a4aa733f9a26af121bd8caeae262b693
-
SSDEEP
3072:1qN4fDJNpygmDiAk5vTol3pJVwEUQ7HlPIXAJ/scSTVJJZMoondbrlp52:TfDJrygmGN6nNzlPIGUcSBJvM3dbxp
Malware Config
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral1/memory/2052-1-0x0000000000A90000-0x0000000000ADC000-memory.dmp family_xenorat -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Terminal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2948 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2948 2052 Terminal.exe 31 PID 2052 wrote to memory of 2948 2052 Terminal.exe 31 PID 2052 wrote to memory of 2948 2052 Terminal.exe 31 PID 2052 wrote to memory of 2948 2052 Terminal.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Terminal.exe"C:\Users\Admin\AppData\Local\Temp\Terminal.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCFDD.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5312958d15c3eb5e3d7e7d6c44a287192
SHA187a080141a7692e5344dbfdbd016513783ecd99c
SHA256e34df3214fde4d0ac4ae2e13de141d61eaabbb6584e6054dcd635880d1d24acf
SHA512bfae4c9374af424d0d938215a16ffd4f05c2f840fdd8dc4e30e2cbfb87048629d13b8dfaab2113ca4820b214dd0cf2731fd1d19a2d8c8a5e5631c1fc79ee9da6