Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 20:50
Behavioral task
behavioral1
Sample
better.exe
Resource
win7-20240903-en
General
-
Target
better.exe
-
Size
45KB
-
MD5
e1ceac9336a96cb04cc3909ba406b535
-
SHA1
f511cbbd228c9685067bdc81d2411031285e1c75
-
SHA256
36c3156427b6f44bbd149994ae17c422b99efc92a1dd846bf23c2e499a639232
-
SHA512
85d889cad787945820bf2c37d8bf4072dfbb13e692258b6efc00ed6ab4ec1790b1b235d0e034edd1812376ba70d650e1eb3cb95cb3bd61d91b2fb3cbd65bf6ed
-
SSDEEP
768:AdhO/poiiUcjlJIn89SH9Xqk5nWEZ5SbTDaxuI7CPW5G:yw+jjgn8oH9XqcnW85SbTkuI+
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
install_path
appdata
-
port
4782
-
startup_name
Arkhavis.exe
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2080-1-0x0000000000960000-0x0000000000972000-memory.dmp family_xenorat behavioral1/files/0x0008000000016ea4-4.dat family_xenorat behavioral1/memory/2780-10-0x0000000000D40000-0x0000000000D52000-memory.dmp family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 2780 better.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 better.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language better.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language better.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2780 2080 better.exe 30 PID 2080 wrote to memory of 2780 2080 better.exe 30 PID 2080 wrote to memory of 2780 2080 better.exe 30 PID 2080 wrote to memory of 2780 2080 better.exe 30 PID 2780 wrote to memory of 2688 2780 better.exe 31 PID 2780 wrote to memory of 2688 2780 better.exe 31 PID 2780 wrote to memory of 2688 2780 better.exe 31 PID 2780 wrote to memory of 2688 2780 better.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\better.exe"C:\Users\Admin\AppData\Local\Temp\better.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Roaming\XenoManager\better.exe"C:\Users\Admin\AppData\Roaming\XenoManager\better.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Arkhavis.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp24B0.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53bec394dfa473d398675ce8536a266b4
SHA1dd559b15536136d8874ab16180bb2ee192437e5c
SHA256d23fdbcb93728915ff405802af3af96a741b62ed973eb7ed0818f523db84232d
SHA512abb87d74dbe9da78f942ba5f714da4e9439dc3afb29d61932a1189e599684422aa8f68d9433cb3afa614636165307c413329d7e78a7b0c78b90950c53a769a7a
-
Filesize
45KB
MD5e1ceac9336a96cb04cc3909ba406b535
SHA1f511cbbd228c9685067bdc81d2411031285e1c75
SHA25636c3156427b6f44bbd149994ae17c422b99efc92a1dd846bf23c2e499a639232
SHA51285d889cad787945820bf2c37d8bf4072dfbb13e692258b6efc00ed6ab4ec1790b1b235d0e034edd1812376ba70d650e1eb3cb95cb3bd61d91b2fb3cbd65bf6ed