Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 22:51
Behavioral task
behavioral1
Sample
Nitro.exe
Resource
win7-20240903-en
General
-
Target
Nitro.exe
-
Size
45KB
-
MD5
048a4609bb110ca3e09bbfef1cc40c96
-
SHA1
7d01285acc3f07037ab0254da3ec68bf4ceddb34
-
SHA256
57f7eb514c99759aad8e22283c23dc974bb40d0b3bae8fe05fcbf5bd681382e1
-
SHA512
fe2a26dd117df6eda626adb17d316010052098655fe794a37a5861290a4201b3bdc7eff184bcb93152a2e808bce82733dace9de143020c4748161e5ac28a4b1b
-
SSDEEP
768:xdhO/poiiUcjlJInG1H9Xqk5nWEZ5SbTDaSuI7CPW5K:vw+jjgneH9XqcnW85SbTHuIi
Malware Config
Extracted
xenorat
148.0.169.121
Nitro
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Nitro
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2484-1-0x0000000000A30000-0x0000000000A42000-memory.dmp family_xenorat behavioral1/files/0x000800000001612f-4.dat family_xenorat behavioral1/memory/1920-9-0x0000000001040000-0x0000000001052000-memory.dmp family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 1920 Nitro.exe -
Loads dropped DLL 1 IoCs
pid Process 2484 Nitro.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nitro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nitro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1920 2484 Nitro.exe 31 PID 2484 wrote to memory of 1920 2484 Nitro.exe 31 PID 2484 wrote to memory of 1920 2484 Nitro.exe 31 PID 2484 wrote to memory of 1920 2484 Nitro.exe 31 PID 1920 wrote to memory of 2640 1920 Nitro.exe 32 PID 1920 wrote to memory of 2640 1920 Nitro.exe 32 PID 1920 wrote to memory of 2640 1920 Nitro.exe 32 PID 1920 wrote to memory of 2640 1920 Nitro.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nitro.exe"C:\Users\Admin\AppData\Local\Temp\Nitro.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\XenoManager\Nitro.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Nitro.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Nitro" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF844.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5de437554760b4ddf55e4c0df8d5fb7b4
SHA1c2840202b15ed2b2e258d24c8ed94d75f51d6c9f
SHA256fb42616a8c96dd4b39d802e022a24ccece0dbc2aad771dbce0443a47489bcdf1
SHA512818243ac45c5a1603638e09071806434512a9b8074348a9950c7df21fa27ac4b41d2ac47f80fc2f72af78336f97cce90147fee82a3ed17f5aaba96abd27788c3
-
Filesize
45KB
MD5048a4609bb110ca3e09bbfef1cc40c96
SHA17d01285acc3f07037ab0254da3ec68bf4ceddb34
SHA25657f7eb514c99759aad8e22283c23dc974bb40d0b3bae8fe05fcbf5bd681382e1
SHA512fe2a26dd117df6eda626adb17d316010052098655fe794a37a5861290a4201b3bdc7eff184bcb93152a2e808bce82733dace9de143020c4748161e5ac28a4b1b