Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 22:51
Behavioral task
behavioral1
Sample
Nitro.exe
Resource
win7-20240903-en
General
-
Target
Nitro.exe
-
Size
45KB
-
MD5
048a4609bb110ca3e09bbfef1cc40c96
-
SHA1
7d01285acc3f07037ab0254da3ec68bf4ceddb34
-
SHA256
57f7eb514c99759aad8e22283c23dc974bb40d0b3bae8fe05fcbf5bd681382e1
-
SHA512
fe2a26dd117df6eda626adb17d316010052098655fe794a37a5861290a4201b3bdc7eff184bcb93152a2e808bce82733dace9de143020c4748161e5ac28a4b1b
-
SSDEEP
768:xdhO/poiiUcjlJInG1H9Xqk5nWEZ5SbTDaSuI7CPW5K:vw+jjgneH9XqcnW85SbTHuIi
Malware Config
Extracted
xenorat
148.0.169.121
Nitro
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Nitro
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3348-1-0x0000000000620000-0x0000000000632000-memory.dmp family_xenorat behavioral2/files/0x000a000000023bd4-6.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation Nitro.exe -
Executes dropped EXE 1 IoCs
pid Process 3196 Nitro.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nitro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nitro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 696 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3348 wrote to memory of 3196 3348 Nitro.exe 86 PID 3348 wrote to memory of 3196 3348 Nitro.exe 86 PID 3348 wrote to memory of 3196 3348 Nitro.exe 86 PID 3196 wrote to memory of 696 3196 Nitro.exe 87 PID 3196 wrote to memory of 696 3196 Nitro.exe 87 PID 3196 wrote to memory of 696 3196 Nitro.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nitro.exe"C:\Users\Admin\AppData\Local\Temp\Nitro.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Roaming\XenoManager\Nitro.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Nitro.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Nitro" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9C7E.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5de437554760b4ddf55e4c0df8d5fb7b4
SHA1c2840202b15ed2b2e258d24c8ed94d75f51d6c9f
SHA256fb42616a8c96dd4b39d802e022a24ccece0dbc2aad771dbce0443a47489bcdf1
SHA512818243ac45c5a1603638e09071806434512a9b8074348a9950c7df21fa27ac4b41d2ac47f80fc2f72af78336f97cce90147fee82a3ed17f5aaba96abd27788c3
-
Filesize
45KB
MD5048a4609bb110ca3e09bbfef1cc40c96
SHA17d01285acc3f07037ab0254da3ec68bf4ceddb34
SHA25657f7eb514c99759aad8e22283c23dc974bb40d0b3bae8fe05fcbf5bd681382e1
SHA512fe2a26dd117df6eda626adb17d316010052098655fe794a37a5861290a4201b3bdc7eff184bcb93152a2e808bce82733dace9de143020c4748161e5ac28a4b1b