Analysis
-
max time kernel
148s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-09-2024 20:50
Behavioral task
behavioral1
Sample
better.exe
Resource
win7-20240903-en
General
-
Target
better.exe
-
Size
45KB
-
MD5
e1ceac9336a96cb04cc3909ba406b535
-
SHA1
f511cbbd228c9685067bdc81d2411031285e1c75
-
SHA256
36c3156427b6f44bbd149994ae17c422b99efc92a1dd846bf23c2e499a639232
-
SHA512
85d889cad787945820bf2c37d8bf4072dfbb13e692258b6efc00ed6ab4ec1790b1b235d0e034edd1812376ba70d650e1eb3cb95cb3bd61d91b2fb3cbd65bf6ed
-
SSDEEP
768:AdhO/poiiUcjlJIn89SH9Xqk5nWEZ5SbTDaxuI7CPW5G:yw+jjgn8oH9XqcnW85SbTkuI+
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
install_path
appdata
-
port
4782
-
startup_name
Arkhavis.exe
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/4588-1-0x00000000003F0000-0x0000000000402000-memory.dmp family_xenorat behavioral2/files/0x000600000002aa8d-6.dat family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 3592 better.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language better.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language better.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4208 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4588 wrote to memory of 3592 4588 better.exe 80 PID 4588 wrote to memory of 3592 4588 better.exe 80 PID 4588 wrote to memory of 3592 4588 better.exe 80 PID 3592 wrote to memory of 4208 3592 better.exe 81 PID 3592 wrote to memory of 4208 3592 better.exe 81 PID 3592 wrote to memory of 4208 3592 better.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\better.exe"C:\Users\Admin\AppData\Local\Temp\better.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\XenoManager\better.exe"C:\Users\Admin\AppData\Roaming\XenoManager\better.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Arkhavis.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9069.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
1KB
MD53bec394dfa473d398675ce8536a266b4
SHA1dd559b15536136d8874ab16180bb2ee192437e5c
SHA256d23fdbcb93728915ff405802af3af96a741b62ed973eb7ed0818f523db84232d
SHA512abb87d74dbe9da78f942ba5f714da4e9439dc3afb29d61932a1189e599684422aa8f68d9433cb3afa614636165307c413329d7e78a7b0c78b90950c53a769a7a
-
Filesize
45KB
MD5e1ceac9336a96cb04cc3909ba406b535
SHA1f511cbbd228c9685067bdc81d2411031285e1c75
SHA25636c3156427b6f44bbd149994ae17c422b99efc92a1dd846bf23c2e499a639232
SHA51285d889cad787945820bf2c37d8bf4072dfbb13e692258b6efc00ed6ab4ec1790b1b235d0e034edd1812376ba70d650e1eb3cb95cb3bd61d91b2fb3cbd65bf6ed