Analysis
-
max time kernel
144s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 04:03
Behavioral task
behavioral1
Sample
Svchost.exe
Resource
win7-20240903-en
General
-
Target
Svchost.exe
-
Size
45KB
-
MD5
d7b665428dd5924505511bd5c0f79e28
-
SHA1
ef1480132b1bae773ef2ddede22e0f1ae7786625
-
SHA256
c69792d8a8ef30f50d118949aee702a01be0cafb4e9f6c9b544a8bb193ea5994
-
SHA512
9c0918269b6c8ed93cff186ae13fc0bb288be64381f6465597c619a5a894e76cf5af45c46b7a1aea3c0acd184fc4f74cc2e2dc2b4dc9cedae6643b8ad74f9521
-
SSDEEP
768:ldhO/poiiUcjlJInShYH9Xqk5nWEZ5SbTDaCuI7CPW5u:7w+jjgnSSH9XqcnW85SbTXuIm
Malware Config
Extracted
xenorat
zenofs.zapto.org
Svcchost
-
install_path
appdata
-
port
4444
-
startup_name
Windows Support
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3944-1-0x0000000000C00000-0x0000000000C12000-memory.dmp family_xenorat behavioral2/files/0x00070000000234c0-6.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation Svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3320 Svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 672 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3944 wrote to memory of 3320 3944 Svchost.exe 82 PID 3944 wrote to memory of 3320 3944 Svchost.exe 82 PID 3944 wrote to memory of 3320 3944 Svchost.exe 82 PID 3320 wrote to memory of 672 3320 Svchost.exe 83 PID 3320 wrote to memory of 672 3320 Svchost.exe 83 PID 3320 wrote to memory of 672 3320 Svchost.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Svchost.exe"C:\Users\Admin\AppData\Local\Temp\Svchost.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Roaming\XenoManager\Svchost.exe"C:\Users\Admin\AppData\Roaming\XenoManager\Svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Support" /XML "C:\Users\Admin\AppData\Local\Temp\tmp172D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5dc9da360c13e549113fa679558d32557
SHA1c3edf7411c9ca91cf84ff5caee8617daab489d9c
SHA2560b86988e5abcb35b0a4b2c12b4a0a6875aecfb910d87ec8dbcaf0a7d6a039725
SHA51244645a3693177ab17be7d831b660be5f378e2930ccc23a4a8d3587ed8dd748fe2e65d47d90f0026f73be746a500a34b14bf3e93cc8edd62f71671cc4c58bee7a
-
Filesize
45KB
MD5d7b665428dd5924505511bd5c0f79e28
SHA1ef1480132b1bae773ef2ddede22e0f1ae7786625
SHA256c69792d8a8ef30f50d118949aee702a01be0cafb4e9f6c9b544a8bb193ea5994
SHA5129c0918269b6c8ed93cff186ae13fc0bb288be64381f6465597c619a5a894e76cf5af45c46b7a1aea3c0acd184fc4f74cc2e2dc2b4dc9cedae6643b8ad74f9521