Analysis
-
max time kernel
290s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
Pago Pendiente.exe
Resource
win7-20240903-en
General
-
Target
Pago Pendiente.exe
-
Size
349KB
-
MD5
801c9030471f7628b4d4420f5f39d4bc
-
SHA1
2ba63101806334f1ea3460c3eec88bb413a850a9
-
SHA256
e549d0806346bc3a34579c8af334c61be85c169bf735deb49de85b70bad3549a
-
SHA512
7255144d46c2e642ae5399ad5040c7bce508f2b332ef55d6c3cfe6450dcc0c9d8356618b439d35c177648c8fc3d06644d39ca0df431f082207bafb1445d4aa32
-
SSDEEP
6144:Gha3BXN9O4vSGmZnKkJZNGXsPrN9HbPWqqGHRZI:Ca3B9xSGmZn5+XWR9HbPWqqGHE
Malware Config
Extracted
xenorat
154.216.17.155
Xeno_rat_nd8912d
-
delay
50010
-
install_path
appdata
-
port
1359
-
startup_name
cvcr
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral2/memory/2344-9-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Pago Pendiente.exe -
Executes dropped EXE 3 IoCs
pid Process 2568 Pago Pendiente.exe 3560 Pago Pendiente.exe 3892 Pago Pendiente.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4132 set thread context of 2344 4132 Pago Pendiente.exe 82 PID 4132 set thread context of 1140 4132 Pago Pendiente.exe 83 PID 2568 set thread context of 3560 2568 Pago Pendiente.exe 85 PID 2568 set thread context of 3892 2568 Pago Pendiente.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pago Pendiente.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pago Pendiente.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pago Pendiente.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pago Pendiente.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pago Pendiente.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pago Pendiente.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4556 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4132 Pago Pendiente.exe Token: SeDebugPrivilege 2568 Pago Pendiente.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4132 wrote to memory of 2344 4132 Pago Pendiente.exe 82 PID 4132 wrote to memory of 2344 4132 Pago Pendiente.exe 82 PID 4132 wrote to memory of 2344 4132 Pago Pendiente.exe 82 PID 4132 wrote to memory of 2344 4132 Pago Pendiente.exe 82 PID 4132 wrote to memory of 2344 4132 Pago Pendiente.exe 82 PID 4132 wrote to memory of 2344 4132 Pago Pendiente.exe 82 PID 4132 wrote to memory of 2344 4132 Pago Pendiente.exe 82 PID 4132 wrote to memory of 2344 4132 Pago Pendiente.exe 82 PID 4132 wrote to memory of 1140 4132 Pago Pendiente.exe 83 PID 4132 wrote to memory of 1140 4132 Pago Pendiente.exe 83 PID 4132 wrote to memory of 1140 4132 Pago Pendiente.exe 83 PID 4132 wrote to memory of 1140 4132 Pago Pendiente.exe 83 PID 4132 wrote to memory of 1140 4132 Pago Pendiente.exe 83 PID 4132 wrote to memory of 1140 4132 Pago Pendiente.exe 83 PID 4132 wrote to memory of 1140 4132 Pago Pendiente.exe 83 PID 4132 wrote to memory of 1140 4132 Pago Pendiente.exe 83 PID 1140 wrote to memory of 2568 1140 Pago Pendiente.exe 84 PID 1140 wrote to memory of 2568 1140 Pago Pendiente.exe 84 PID 1140 wrote to memory of 2568 1140 Pago Pendiente.exe 84 PID 2568 wrote to memory of 3560 2568 Pago Pendiente.exe 85 PID 2568 wrote to memory of 3560 2568 Pago Pendiente.exe 85 PID 2568 wrote to memory of 3560 2568 Pago Pendiente.exe 85 PID 2568 wrote to memory of 3560 2568 Pago Pendiente.exe 85 PID 2568 wrote to memory of 3560 2568 Pago Pendiente.exe 85 PID 2568 wrote to memory of 3560 2568 Pago Pendiente.exe 85 PID 2568 wrote to memory of 3560 2568 Pago Pendiente.exe 85 PID 2568 wrote to memory of 3560 2568 Pago Pendiente.exe 85 PID 2568 wrote to memory of 3892 2568 Pago Pendiente.exe 86 PID 2568 wrote to memory of 3892 2568 Pago Pendiente.exe 86 PID 2568 wrote to memory of 3892 2568 Pago Pendiente.exe 86 PID 2568 wrote to memory of 3892 2568 Pago Pendiente.exe 86 PID 2568 wrote to memory of 3892 2568 Pago Pendiente.exe 86 PID 2568 wrote to memory of 3892 2568 Pago Pendiente.exe 86 PID 2568 wrote to memory of 3892 2568 Pago Pendiente.exe 86 PID 2568 wrote to memory of 3892 2568 Pago Pendiente.exe 86 PID 2344 wrote to memory of 4556 2344 Pago Pendiente.exe 96 PID 2344 wrote to memory of 4556 2344 Pago Pendiente.exe 96 PID 2344 wrote to memory of 4556 2344 Pago Pendiente.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pago Pendiente.exe"C:\Users\Admin\AppData\Local\Temp\Pago Pendiente.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\Pago Pendiente.exe"C:\Users\Admin\AppData\Local\Temp\Pago Pendiente.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "cvcr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4A52.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Pago Pendiente.exe"C:\Users\Admin\AppData\Local\Temp\Pago Pendiente.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Roaming\XenoManager\Pago Pendiente.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Pago Pendiente.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\XenoManager\Pago Pendiente.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Pago Pendiente.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\Pago Pendiente.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Pago Pendiente.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
1KB
MD5a5f8dd4b93dd7b2c445a0e13ed2fa40b
SHA1ddd97c1093cb03fe90e2ecc934ba968b72b8ab63
SHA2563efb46c492238b318354a32d6caa7bd1772083de51d73e25152397c5e84ffc7c
SHA5121367f230215eb8b8e8c262833520d92c1fabab31faae23ab92afc2ea3038a9c263e481652476520d4f2df73121731830de1837cdecca9666cf895eeb18be4a00
-
Filesize
349KB
MD5801c9030471f7628b4d4420f5f39d4bc
SHA12ba63101806334f1ea3460c3eec88bb413a850a9
SHA256e549d0806346bc3a34579c8af334c61be85c169bf735deb49de85b70bad3549a
SHA5127255144d46c2e642ae5399ad5040c7bce508f2b332ef55d6c3cfe6450dcc0c9d8356618b439d35c177648c8fc3d06644d39ca0df431f082207bafb1445d4aa32